Here below is the list of Most Cited Publications about ‘Proof of Work’.

Proof of Work algorithms are used by the majority of present day cryptocurrencies. Different approaches try to resist centralization by special hardware by relying on memory intensive algorithms. Proof-of-work can also be applied to cloud computing and non-blockchain applications, such as reducing spam in email. Generally, these are highly mathematical and game-theoretic scenarios. Some algorithms try to combine proof of work with more useful work, such as finding prime numbers.

Last updated November 19th, 2017.

Most Cited ‘Proof of Work’ Publications

  1. Bitcoin: A peer-to-peer electronic cash system“. S Nakamoto. 2008. academia.edu 2024 cites.
  2. Authenticated routing for ad hoc networks“. K Sanzgiri, D LaFlamme, B Dahill…. 2005. ieeexplore.ieee.org IEEE Journal on …367 cites.
  3. Hashcash-a denial of service counter-measure“. A Back. 2002. sunsite.icm.edu.pl 354 cites.
  4. Majority is not enough: Bitcoin mining is vulnerable“. I Eyal, EG Sirer. 2014. Springer International conference on financial cryptography and …345 cites.
  5. Quantitative analysis of the full bitcoin transaction graph“. D Ron, A Shamir. 2013. Springer … Conference on Financial Cryptography and Data …308 cites.
  6. Bitter to better—how to make bitcoin a better currency“. S Barber, X Boyen, E Shi, E Uzun. 2012. Springer International Conference on Financial …307 cites.
  7. An analysis of anonymity in the bitcoin system“. F Reid, M Harrigan. 2013. Springer Security and privacy in social networks297 cites.
  8. Zerocoin: Anonymous distributed e-cash from bitcoin“. I Miers, C Garman, M Green…. 2013. ieeexplore.ieee.org Security and Privacy (SP) …293 cites.
  9. Fighting spam on social web sites: A survey of approaches and future challenges“. P Heymann, G Koutrika…. 2007. ieeexplore.ieee.org IEEE Internet …288 cites.
  10. Filtering spam with behavioral blacklisting“. A Ramachandran, N Feamster, S Vempala. 2007. dl.acm.org Proceedings of the 14th …275 cites.
  11. Moderately hard, memory-bound functions“. M Abadi, M Burrows, M Manasse…. 2005. dl.acm.org ACM Transactions on …273 cites.
  12. An empirical study of spam traffic and the use of DNS black lists“. J Jung, E Sit. 2004. dl.acm.org Proceedings of the 4th ACM SIGCOMM conference on …268 cites.
  13. Legal violence: Immigration law and the lives of Central American immigrants“. C Menjívar, L Abrego. 2012. journals.uchicago.edu American Journal of Sociology252 cites.
  14. Ethereum: A secure decentralised generalised transaction ledger“. G Wood. 2014. cryptopapers.net Ethereum Project Yellow Paper237 cites.
  15. Zerocash: Decentralized anonymous payments from bitcoin“. EB Sasson, A Chiesa, C Garman…. 2014. ieeexplore.ieee.org Security and Privacy …235 cites.
  16. Security threats in cloud computing“. FB Shaikh, S Haider. 2011. ieeexplore.ieee.org Internet technology and secured …230 cites.
  17. Incentive-aware routing in DTNs“. U Shevade, HH Song, L Qiu…. 2008. ieeexplore.ieee.org Network Protocols, 2008 …229 cites.
  18. Self-assembly of metal nanocrystals on ultrathin oxide for nonvolatile memory applications“. C Lee, J Meteer, V Narayanan, EC Kan. 2005. Springer Journal of Electronic Materials224 cites.
  19. Information propagation in the bitcoin network“. C Decker, R Wattenhofer. 2013. ieeexplore.ieee.org Peer-to-Peer Computing (P2P) …218 cites.
  20. Evaluating user privacy in bitcoin“. E Androulaki, GO Karame, M Roeschlin…. 2013. Springer … Conference on Financial …217 cites.
  21. The session initiation protocol (SIP) and spam“. J Rosenberg, C Jennings. 2008. rfc-editor.org 209 cites.
  22. Establishing the Genuinity of Remote Computer Systems.“. R Kennell, LH Jamieson. 2003. static.usenix.org USENIX Security Symposium201 cites.
  23. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies“. J Bonneau, A Miller, J Clark…. 2015. ieeexplore.ieee.org Security and Privacy …200 cites.
  24. Portcullis: protecting connection setup from denial-of-capability attacks“. B Parno, D Wendlandt, E Shi, A Perrig…. 2007. dl.acm.org ACM SIGCOMM …197 cites.
  25. Bitcoin: Economics, technology, and governance“. R Böhme, N Christin…. 2015. American Economic Association The Journal of …195 cites.
  26. The Bitcoin Backbone Protocol: Analysis and Applications.“. JA Garay, A Kiayias, N Leonardos. 2015. eprint.iacr.org EUROCRYPT (2)187 cites.
  27. Proofs of work and bread pudding protocols“. M Jakobsson, A Juels. 1999. Springer Secure Information Networks176 cites.
  28. RE: Reliable Email.“. S Garriss, M Kaminsky, MJ Freedman, B Karp…. 2006. usenix.org NSDI170 cites.
  29. Bounds on information exchange for Byzantine agreement“. D Dolev, R Reischuk. 1985. dl.acm.org Journal of the ACM (JACM)167 cites.
  30. Methods, apparatus and systems for chronicling the activities of field technicians“. S Nielsen, C Chambers, J Farr. 2012. Google Patents US Patent App. 13/465,524166 cites.
  31. Beware the middleman: Empirical analysis of Bitcoin-exchange risk“. T Moore, N Christin. 2013. Springer … Conference on Financial Cryptography and Data …162 cites.
  32. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again“. N Bitansky, R Canetti, A Chiesa, E Tromer. 2012. dl.acm.org Proceedings of the 3rd …160 cites.
  33. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries“. JA Kroll, IC Davey, EW Felten. 2013. thebitcoin.fr Proceedings of WEIS157 cites.
  34. The regularisation of unauthorized migrants: Literature survey and country case studies“. A Levinson. 2005. compas.ox.ac.uk 157 cites.
  35. Time and work tracker“. GR Skinner, MG Lehman. 1997. Google Patents US Patent 5,696,702155 cites.
  36. Optimal mechanism design and money burning“. JD Hartline, T Roughgarden. 2008. dl.acm.org Proceedings of the fortieth annual ACM …149 cites.
  37. Using uncleanliness to predict future botnet addresses“. MP Collins, TJ Shimeall, S Faber, J Janies…. 2007. dl.acm.org Proceedings of the 7th …145 cites.
  38. On bitcoin and red balloons“. M Babaioff, S Dobzinski, S Oren, A Zohar. 2012. dl.acm.org Proceedings of the 13th ACM …142 cites.
  39. Modeling and preventing phishing attacks“. M Jakobsson. 2005. researchgate.net Financial Cryptography142 cites.
  40. Information security economics–and beyond“. R Anderson, T Moore. 2007. Springer Advances in cryptology-crypto 2007136 cites.
  41. Peer-to-peer systems“. R Rodrigues, P Druschel. 2010. dl.acm.org Communications of the ACM131 cites.
  42. Proof-of-work proves not to work; version 0.2“. B Laurie, R Clayton. 2004. pdfs.semanticscholar.org Workshop on Economics and …130 cites.
  43. Double-spending fast payments in bitcoin“. GO Karame, E Androulaki, S Capkun. 2012. dl.acm.org … of the 2012 ACM conference on …129 cites.
  44. Brown-collar jobs: Occupational segregation and earnings of recent-immigrant Latinos“. L Catanzarite. 2000. journals.sagepub.com Sociological Perspectives123 cites.
  45. Dismantling the poverty trap: Disability policy for the twenty‐first century“. DC Stapleton, BL O’day, GA Livermore…. 2006. Wiley Online Library The Milbank …122 cites.
  46. Decentralizing privacy: Using blockchain to protect personal data“. G Zyskind, O Nathan. 2015. ieeexplore.ieee.org Security and Privacy Workshops (SPW …119 cites.
  47. Proofs of work and bread pudding protocols“. BM Jakobsson, A Juels. 2008. Google Patents US Patent 7,356,696117 cites.
  48. On scaling decentralized blockchains“. K Croman, C Decker, I Eyal, AE Gencer, A Juels…. 2016. Springer … Conference on Financial …114 cites.
  49. Bitcoin-NG: A Scalable Blockchain Protocol.“. I Eyal, AE Gencer, EG Sirer, R Van Renesse. 2016. usenix.org NSDI114 cites.
  50. Network time and work tracker“. GR Skinner, MG Lehman. 1999. Google Patents US Patent 5,963,914112 cites.
  51. Proof nets for unit-free multiplicative-additive linear logic“. DJD Hughes, RJ Van Glabbeek. 2005. dl.acm.org ACM Transactions on Computational …111 cites.
  52. The taxation of undocumented immigrants: Separate, unequal, and without representation“. FJ Lipman. 2006. HeinOnline Harv. Latino L. Rev.111 cites.
  53. An Empirical Study of Clustering Behavior of Spammers and Group-based Anti-Spam Strategies.“. F Li, MH Hsieh. 2006. pdfs.semanticscholar.org CEAS109 cites.
  54. An analysis of anonymity in the bitcoin system“. F Reid, M Harrigan. 2011. ieeexplore.ieee.org Privacy, Security, Risk and Trust (PASSAT …107 cites.
  55. Cryptographic primitives enforcing communication and storage complexity“. P Golle, S Jarecki, I Mironov. 2002. Springer International Conference on Financial …104 cites.
  56. A next-generation smart contract and decentralized application platform“. V Buterin. 2014. weusecoins.com white paper104 cites.
  57. Secure computation without authentication“. B Barak, R Canetti, Y Lindell, R Pass…. 2005. Springer Annual International …100 cites.
  58. Welfare trends in Sweden: balancing the books for the 1990s“. J Palme, A Bergmark, O Backman…. 2002. journals.sagepub.com … of European Social …100 cites.
  59. Mixcoin: Anonymity for Bitcoin with accountable mixes“. J Bonneau, A Narayanan, A Miller, J Clark…. 2014. Springer … Conference on Financial …99 cites.
  60. Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing“. MH Sqalli, F Al-Haidari, K Salah. 2011. ieeexplore.ieee.org Utility and Cloud Computing …98 cites.
  61. Transformations between uml and owl-s“. R Grønmo, MC Jaeger, H Hoff. 2005. Springer European Conference on Model Driven …98 cites.
  62. “When perhaps the real problem is money itself!”: the practical materiality of Bitcoin“. B Maurer, TC Nelms, L Swartz. 2013. Taylor & Francis Social Semiotics97 cites.
  63. Structure and anonymity of the bitcoin transaction graph“. M Ober, S Katzenbeisser, K Hamacher. 2013. mdpi.com Future internet93 cites.
  64. James Joyce“. HS Gorman. 1974. Octagon Press, Limited 93 cites.
  65. Countering DoS attacks with stateless multipath overlays“. A Stavrou, AD Keromytis. 2005. dl.acm.org Proceedings of the 12th ACM conference on …93 cites.
  66. How to play almost any mental game over the net-concurrent composition via super-polynomial simulation“. B Barak, A Sahai. 2005. ieeexplore.ieee.org … of Computer Science, 2005. FOCS 2005 …92 cites.
  67. The Midwives Book“. J Sharp. 1985. revolvy.com 92 cites.
  68. NetFence: preventing internet denial of service from inside out“. X Liu, X Yang, Y Xia. 2010. dl.acm.org ACM SIGCOMM Computer Communication …90 cites.
  69. Free riding in peer-to-peer networks“. M Karakaya, I Korpeoglu, Ö Ulusoy. 2009. ieeexplore.ieee.org IEEE Internet computing89 cites.
  70. Deanonymisation of clients in Bitcoin P2P network“. A Biryukov, D Khovratovich, I Pustogarov. 2014. dl.acm.org Proceedings of the 2014 ACM …88 cites.
  71. Guaranteeing access in spite of distributed service-flooding attacks“. VD Gligor. 2003. Springer Security Protocols Workshop86 cites.
  72. Blockchains and smart contracts for the internet of things“. K Christidis, M Devetsikiotis. 2016. ieeexplore.ieee.org IEEE Access86 cites.
  73. Monte Carlo estimates of the mass gap of the O (2) and O (3) spin models in 1+ 1 dimensions“. G Fox, R Gupta, O Martin, S Otto. 1982. Elsevier Nuclear Physics B86 cites.
  74. Welfare and the unemployment crisis: Sweden in the 1990s“. Å Bergmark, J Palme. 2003. Wiley Online Library International Journal of Social Welfare85 cites.
  75. Innovations in payment technologies and the emergence of digital currencies“. R Ali, J Barrdear, R Clews, J Southgate. 2014. papers.ssrn.com 83 cites.
  76. The economics of Bitcoin and similar private digital currencies“. GP Dwyer. 2015. Elsevier Journal of Financial Stability83 cites.
  77. Transition: The History of a Literary Era 1927-1938“. D McMillan. 1975. Calder Publications Limited 82 cites.
  78. Analysis of hashrate-based double spending“. M Rosenfeld. 2014. arxiv.org arXiv preprint arXiv:1402.200980 cites.
  79. Enabling blockchain innovations with pegged sidechains“. A Back, M Corallo, L Dashjr, M Friedenbach…. 2014. blockstream.ca URL: http://www …80 cites.
  80. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication“. M Vukolić. 2015. Springer International Workshop on Open Problems in Network …79 cites.
  81. A unified framework for concurrent security: universal composability from stand-alone non-malleability“. H Lin, R Pass, M Venkitasubramaniam. 2009. dl.acm.org … of the forty-first annual ACM …79 cites.
  82. Permacoin: Repurposing bitcoin work for data preservation“. A Miller, A Juels, E Shi, B Parno…. 2014. ieeexplore.ieee.org Security and Privacy (SP) …76 cites.
  83. The effect of stock spam on financial markets“. R Böhme, T Holz. 2006. papers.ssrn.com 76 cites.
  84. Making nursing visible? Gender, technology and the care plan as script“. M Wilson. 2002. emeraldinsight.com Information Technology & People76 cites.
  85. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake“. S King, S Nadal. 2012. peerco.in self-published paper, August75 cites.
  86. Analyzing interaction between distributed denial of service attacks and mitigation technologies“. WJ Blackert, DM Gregg, AK Castner…. 2003. ieeexplore.ieee.org … and exposition, 2003 …75 cites.
  87. Secure high-rate transaction processing in bitcoin“. Y Sompolinsky, A Zohar. 2015. Springer … Conference on Financial Cryptography and Data …75 cites.
  88. Do the rich get richer? An empirical analysis of the Bitcoin transaction network“. D Kondor, M Pósfai, I Csabai, G Vattay. 2014. journals.plos.org PloS one75 cites.
  89. Mitigating distributed denial of service attacks with dynamic resource pricing“. D Mankins, R Krishnan, C Boyd, J Zao…. 2001. ieeexplore.ieee.org … , 2001. ACSAC 2001 …74 cites.
  90. Keeping denial-of-service attackers in the dark“. G Badishi, A Herzberg, I Keidar. 2007. ieeexplore.ieee.org IEEE Transactions on …74 cites.
  91. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin.“. G Karame, E Androulaki…. 2012. users.encs.concordia.ca IACR Cryptology ePrint …74 cites.
  92. CoinShuffle: Practical decentralized coin mixing for Bitcoin“. T Ruffing, P Moreno-Sanchez, A Kate. 2014. Springer European Symposium on …72 cites.
  93. The miner’s dilemma“. I Eyal. 2015. ieeexplore.ieee.org Security and Privacy (SP), 2015 IEEE Symposium on71 cites.
  94. Secure distributed human computation“. C Gentry, Z Ramzan, S Stubblebine. 2005. dl.acm.org … of the 6th ACM conference on …70 cites.
  95. Bitcoin mining and its energy footprint“. KJ O’Dwyer, D Malone. 2014. IET 68 cites.
  96. Propagating trust in ad-hoc networks for reliable routing“. AA Pirzada, A Datta, C McDonald. 2004. ieeexplore.ieee.org Wireless Ad-Hoc Networks …65 cites.
  97. The Illlusory Provisions of Sanctions: The Immigration Reform and Control Act of 1986“. CM Espenoza. 1994. HeinOnline Geo. Immigr. LJ64 cites.
  98. Is Bitcoin a decentralized currency?“. A Gervais, G Karame, S Capkun, V Capkun. 2014. syssec.ethz.ch IEEE security & privacy64 cites.
  99. Blockchain technology: principles and applications“. M Pilkington. 2015. papers.ssrn.com Browser Download This Paper63 cites.
  100. SoK: secure messaging“. N Unger, S Dechand, J Bonneau, S Fahl…. 2015. ieeexplore.ieee.org Security and Privacy …62 cites.
  101. Commitcoin: Carbon dating commitments with bitcoin“. J Clark, A Essex. 2012. Springer Financial Cryptography and Data Security61 cites.
  102. Towards Reliable Storage of 56-bit Secrets in Human Memory.“. J Bonneau, SE Schechter. 2014. usenix.org USENIX Security Symposium61 cites.
  103. Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake [Extended Abstract] y“. I Bentov, C Lee, A Mizrahi, M Rosenfeld. 2014. dl.acm.org ACM SIGMETRICS …60 cites.
  104. Enhancing bitcoin security and performance with strong consistency via collective signing“. EK Kogias, P Jovanovic, N Gailly, I Khoffi…. 2016. usenix.org 25th USENIX Security …60 cites.
  105. Decentralized blockchain technology and the rise of lex cryptographia“. A Wright, P De Filippi. 2015. papers.ssrn.com 60 cites.
  106. Optimal selfish mining strategies in bitcoin“. A Sapirshtein, Y Sompolinsky, A Zohar. 2016. Springer International Conference on …59 cites.
  107. Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks“. S VivinSandar, S Shenai. 2012. search.proquest.com International Journal of Computer …58 cites.
  108. Tachograph for motor vehicles“. G Mutz. 1987. Google Patents US Patent 4,644,36857 cites.
  109. Secure outsourced garbled circuit evaluation for mobile devices“. H Carter, B Mood, P Traynor…. 2016. content.iospress.com Journal of Computer …57 cites.
  110. The sudden removal of user fees: the perspective of a frontline manager in Burundi“. M Nimpagaritse, MP Bertone. 2011. academic.oup.com Health policy and planning56 cites.
  111. Hidden struggles: spaces of power and resistance in informal work in urban Argentina“. R Whitson. 2007. journals.sagepub.com Environment and Planning A56 cites.
  112. Application of the random forest method in studies of local lymph node assay based skin sensitization data“. S Li, A Fedorowicz, H Singh…. 2005. ACS Publications Journal of chemical …55 cites.
  113. Diverticular disease of the colon: a 1968 view.“. I Williams. 1968. ncbi.nlm.nih.gov Gut54 cites.
  114. Proofs of space“. S Dziembowski, S Faust, V Kolmogorov…. 2015. Springer Annual Cryptology …54 cites.
  115. How many undocumented: The numbers behind the US-Mexico migration talks“. BL Lowell, R Suro. 2002. researchgate.net 54 cites.
  116. Time and work tracker with hardware abstraction layer“. GR Skinner, MG Lehman. 2001. Google Patents US Patent 6,185,51454 cites.
  117. Quantification of overload injuries to thoracolumbar vertebrae and discs in persons exposed to heavy physical exertions or vibration at the workplace Part II …“. P Brinckmann, W Frobin, M Biggemann, M Tillotson…. 1998. Elsevier Clinical …54 cites.
  118. Outsourced proofs of retrievability“. F Armknecht, JM Bohli, GO Karame, Z Liu…. 2014. dl.acm.org Proceedings of the 2014 …53 cites.
  119. Towards next-generation botnets“. R Hund, M Hamann, T Holz. 2008. ieeexplore.ieee.org Computer Network Defense, 2008 …52 cites.
  120. Inclusive block chain protocols“. Y Lewenberg, Y Sompolinsky, A Zohar. 2015. Springer International Conference on …51 cites.
  121. ScrambleSuit: A polymorphic network protocol to circumvent censorship“. P Winter, T Pulls, J Fuss. 2013. dl.acm.org Proceedings of the 12th ACM workshop on …50 cites.
  122. Cryptocurrencies without proof of work“. I Bentov, A Gabizon, A Mizrahi. 2016. Springer International Conference on Financial …49 cites.
  123. Vuvuzela: Scalable private messaging resistant to traffic analysis“. J Van Den Hooff, D Lazar, M Zaharia…. 2015. dl.acm.org Proceedings of the 25th …49 cites.
  124. Blockstack: A Global Naming and Storage System Secured by Blockchains.“. M Ali, JC Nelson, R Shea, MJ Freedman. 2016. usenix.org USENIX Annual Technical …48 cites.
  125. A moving target DDoS defense mechanism“. H Wang, Q Jia, D Fleck, W Powell, F Li…. 2014. Elsevier Computer …48 cites.
  126. Hourglass schemes: how to prove that cloud files are encrypted“. M Van Dijk, A Juels, A Oprea, RL Rivest…. 2012. dl.acm.org Proceedings of the …48 cites.
  127. On the security and performance of proof of work blockchains“. A Gervais, GO Karame, K Wüst, V Glykantzis…. 2016. dl.acm.org Proceedings of the …47 cites.
  128. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack“. K Nayak, S Kumar, A Miller, E Shi. 2016. ieeexplore.ieee.org Security and Privacy …47 cites.
  129. Distributed Quota Enforcement for Spam Control.“. M Walfish, JD Zamfirescu, H Balakrishnan, DR Karger…. 2006. usenix.org NSDI46 cites.
  130. An economic response to unsolicited communication“. T Loder, M Van Alstyne, R Wash. 2006. degruyter.com Advances in Economic Analysis & …46 cites.
  131. Analysis of the blockchain protocol in asynchronous networks“. R Pass, L Seeman, A Shelat. 2017. Springer … International Conference on the Theory and …45 cites.
  132. Proactively Accountable Anonymous Messaging in Verdict.“. H Corrigan-Gibbs, DI Wolinsky, B Ford. 2013. usenix.org USENIX Security Symposium45 cites.
  133. The problem with Bitcoin“. D Bradbury. 2013. Elsevier Computer Fraud & Security45 cites.
  134. Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money“. GW Peters, E Panayi. 2016. Springer Banking Beyond Banks and Money45 cites.
  135. Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency“. J Becker, D Breuker, T Heide, J Holler…. 2013. Springer The Economics of …44 cites.
  136. Decentralized Anonymous Credentials.“. C Garman, M Green, I Miers. 2014. internetsociety.org NDSS44 cites.
  137. Case study of the miner botnet“. D Plohmann, E Gerhards-Padilla. 2012. ieeexplore.ieee.org Cyber Conflict (CYCON) …43 cites.
  138. The stellar consensus protocol: A federated model for internet-level consensus“. D Mazieres. 2015. weusecoins.com Stellar Development Foundation43 cites.
  139. Controlling spam through lightweight currency“. D Turner, D Havey. 2004. pdfs.semanticscholar.org Proceedings of the Hawaii …43 cites.
  140. Misbehavior in bitcoin: A study of double-spending and accountability“. GO Karame, E Androulaki, M Roeschlin…. 2015. dl.acm.org ACM Transactions on …43 cites.
  141. Toward a secure batch verification with group testing for VANET“. CC Lee, YM Lai. 2013. Springer Wireless networks43 cites.
  142. When More Security Equals Less Workplace Safety: Reconsidering US Laws That Disadvantage Unauthorized Workers“. B Lyon. 2003. HeinOnline U. Pa. J. Lab. & Emp. L.43 cites.
  143. Why countries continue to consider regularization“. A Levinson. 2005. Migration Information Source42 cites.
  144. Centrally banked cryptocurrencies“. G Danezis, S Meiklejohn. 2015. arxiv.org arXiv preprint arXiv:1505.0689542 cites.
  145. Toxic Reproductive and Genetic Hazards in the Workplace: Challenging the Myths of the Tort and Workers’ Compensation Systems“. JM Eggen. 1993. HeinOnline Workers’ Comp. L. Rev.42 cites.
  146. Productivity space of information security in an extension of the Gordon-Loeb’s InvestmentModel“. K Matsuura. 2009. Springer Managing Information Risk and the Economics of …41 cites.
  147. Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols.“. D Stebila, L Kuppusamy, J Rangasamy, C Boyd…. 2011. Springer CT-RSA41 cites.
  148. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools“. B Johnson, A Laszka, J Grossklags, M Vasek…. 2014. Springer … Conference on Financial …41 cites.
  149. The weakest failure detector for message passing set-agreement“. C Delporte-Gallet, H Fauconnier, R Guerraoui…. 2008. Springer International Symposium …41 cites.
  150. Bitcoin over Tor isn’t a good idea“. A Biryukov, I Pustogarov. 2015. ieeexplore.ieee.org Security and Privacy (SP), 2015 …41 cites.
  151. spow: On-demand cloud-based eddos mitigation mechanism“. SH Khor, A Nakao. 2009. falleneth.com HotDep (Fifth Workshop on Hot Topics in System …40 cites.
  152. Anonymity of bitcoin transactions“. M Möser. 2013. wi.uni-muenster.de Münster bitcoin conference40 cites.
  153. Corporate governance and blockchains“. D Yermack. 2017. academic.oup.com Review of Finance40 cites.
  154. Bitcoin: Technical background and data analysis“. AI Badev, M Chen. 2014. papers.ssrn.com 40 cites.
  155. A secure sharding protocol for open blockchains“. L Luu, V Narayanan, C Zheng, K Baweja…. 2016. dl.acm.org Proceedings of the …40 cites.
  156. Where Is Current Research on Blockchain Technology?—A Systematic Review“. J Yli-Huumo, D Ko, S Choi, S Park, K Smolander. 2016. journals.plos.org PloS one40 cites.
  157. Proof of Work can Work.“. D Liu, LJ Camp. 2006. ai2-s2-pdfs.s3.amazonaws.com WEIS39 cites.
  158. Occupational issues of allergic contact dermatitis“. KE Andersen. 2003. Springer … archives of occupational and environmental health39 cites.
  159. Towards a theory of trust in networks of humans and computers“. V Gligor, JM Wing. 2011. Springer Security Protocols XIX39 cites.
  160. Catena: A memory-consuming password-scrambling framework“. C Forler, S Lucks, J Wenzel. 2013. pdfs.semanticscholar.org 39 cites.
  161. Can welfare reform make disability disappear?“. R Galvin. 2004. Wiley Online Library Australian Journal of Social Issues39 cites.
  162. The security cost of cheap user interaction“. R Böhme, J Grossklags. 2011. dl.acm.org Proceedings of the 2011 workshop on New …39 cites.
  163. Systems and methods for protecting against denial of service attacks“. WC Feng, E Kaiser. 2012. Google Patents US Patent 8,321,95538 cites.
  164. Bitcoin is memory“. WJ Luther, J Olson. 2013. papers.ssrn.com 38 cites.
  165. Architecture of the Hyperledger blockchain fabric“. C Cachin. 2016. pdfs.semanticscholar.org Workshop on Distributed Cryptocurrencies and …38 cites.
  166. Motag: Moving target defense against internet denial of service attacks“. Q Jia, K Sun, A Stavrou. 2013. ieeexplore.ieee.org Computer Communications and …38 cites.
  167. Primed: community-of-interest-based ddos mitigation“. P Verkaik, O Spatscheck, J Van der Merwe…. 2006. dl.acm.org Proceedings of the …38 cites.
  168. Do libertarians dream of electric coins? The material embeddedness of Bitcoin“. H Karlstrøm. 2014. Taylor & Francis Distinktion: Scandinavian Journal of Social Theory37 cites.
  169. The role of gender in user resistance and information systems failure“. M Wilson, D Howcroft. 2000. Springer … and social perspectives on information technology37 cites.
  170. Unconditional welfare benefits and the principle of reciprocity“. S Segall. 2005. journals.sagepub.com Politics, philosophy & economics36 cites.
  171. The hunting of the SNARK“. N Bitansky, R Canetti, A Chiesa, S Goldwasser…. 2017. Springer Journal of …36 cites.
  172. Enhancing ZRTP by using Computational Puzzles.“. H Hlavacs, WN Gansterer, H Schabauer, J Zottl…. 2008. jucs.org J. UCS36 cites.
  173. Adapting workers’ compensation to the special problems of occupational disease“. L Locke. 1985. HeinOnline Harv. Envtl. L. Rev.35 cites.
  174. To Hash or Not to Hash Again?(In) Differentiability Results for H 2 and HMAC.“. Y Dodis, T Ristenpart, JP Steinberger, S Tessaro. 2012. Springer CRYPTO35 cites.
  175. Demystifying incentives in the consensus computer“. L Luu, J Teutsch, R Kulkarni, P Saxena. 2015. dl.acm.org Proceedings of the 22nd ACM …35 cites.
  176. Halting password puzzles“. X Boyen. 2007. static.usenix.org Proc. Usenix Security35 cites.
  177. Primecoin: Cryptocurrency with prime number proof-of-work“. S King. 2013. bravenewcoin.com July 7th34 cites.
  178. Proofs of space: When space is of the essence“. G Ateniese, I Bonacina, A Faonio, N Galesi. 2014. Springer International Conference on …34 cites.
  179. R-Chain: A Self-Maintained Reputation Management System in P2P Networks.“. L Liu, S Zhang, KD Ryu, P Dasgupta. 2004. cactus.eas.asu.edu ISCA PDCS34 cites.
  180. The Plight of the Targeted Attacker in a World of Scale.“. C Herley. 2010. fbiic.gov WEIS34 cites.
  181. The market for cryptocurrencies“. LH White. 2015. HeinOnline Cato J.34 cites.
  182. About the relation between psycho-analytic training and psycho-analytic therapy“. M Grotjahn. 1954. search.proquest.com The International journal of psycho-analysis34 cites.
  183. Botcoin: Monetizing Stolen Cycles.“. DY Huang, H Dharmdasani, S Meiklejohn, V Dave…. 2014. cs.ucl.ac.uk NDSS34 cites.
  184. DoS: Fighting fire with fire“. M Walfish, H Balakrishnan, D Karger, S Shenker. 2005. conferences.sigcomm.org 33 cites.
  185. Bitcoin mining pools: A cooperative game theoretic analysis“. Y Lewenberg, Y Bachrach, Y Sompolinsky…. 2015. dl.acm.org Proceedings of the …33 cites.
  186. The dual receiver cryptosystem and its applications“. T Diament, HK Lee, AD Keromytis, M Yung. 2004. dl.acm.org Proceedings of the 11th …33 cites.
  187. Low-Cost Client Puzzles Based on Modular Exponentiation.“. G Karame, S Capkun. 2010. Springer ESORICS33 cites.
  188. Blockchain technology: Beyond bitcoin“. M Crosby, P Pattanayak, S Verma…. 2016. scet.berkeley.edu Applied …33 cites.
  189. Speed-Security Tradeoffs in Blockchain Protocols.“. A Kiayias, G Panagiotakos. 2015. pdfs.semanticscholar.org IACR Cryptology ePrint …33 cites.
  190. Bitcoin meets strong consistency“. C Decker, J Seidel, R Wattenhofer. 2016. dl.acm.org Proceedings of the 17th International …32 cites.
  191. Tampering with the delivery of blocks and transactions in bitcoin“. A Gervais, H Ritzdorf, GO Karame…. 2015. dl.acm.org Proceedings of the 22nd …32 cites.
  192. Sybilcontrol: practical sybil defense with computational puzzles“. F Li, P Mittal, M Caesar, N Borisov. 2012. dl.acm.org … of the seventh ACM workshop on …32 cites.
  193. Regularization programs for undocumented migrants“. S Sunderhaus. 2007. ceeol.com Migration Letters32 cites.
  194. A domain-specific language for modelling security objectives in a business process models of soa applications“. M Saleem, J Jaafar, M Hassan. 2012. researchgate.net AISS31 cites.
  195. Spacecoin: A cryptocurrency based on proofs of space“. S Park, K Pietrzak, J Alwen, G Fuchsbauer, P Gazi. 2015. pdfs.semanticscholar.org 31 cites.
  196. Trust transfer: Encouraging self-recommendations without sybil attack“. JM Seigneur, A Gray, CD Jensen. 2005. Springer iTrust31 cites.
  197. Sharing ledgers for sharing economies: an exploration of mutual distributed ledgers (aka blockchain technology)“. M Mainelli, M Smith. 2015. the-blockchain.com The Journal of Financial Perspectives31 cites.
  198. The bitcoin P2P network“. JAD Donet, C Pérez-Sola…. 2014. Springer … Conference on Financial …31 cites.
  199. ChoiceNet: toward an economy plane for the Internet“. T Wolf, J Griffioen, KL Calvert, R Dutta…. 2014. dl.acm.org ACM SIGCOMM …31 cites.
  200. Labor law after legalization“. MJ Wishnie. 2007. HeinOnline Minn. L. Rev.31 cites.
  201. Financial exclusion in Latin America—or the social costs of not banking the urban poor“. TM Solo. 2008. journals.sagepub.com Environment and Urbanization31 cites.
  202. On Bitcoin as a public randomness source.“. J Bonneau, J Clark, S Goldfeder. 2015. pdfs.semanticscholar.org IACR Cryptology ePrint …31 cites.
  203. Test martingales, Bayes factors and p-values“. G Shafer, A Shen, N Vereshchagin, V Vovk. 2011. JSTOR Statistical Science31 cites.
  204. Multi layer approach to defend ddos attacks caused by spam“. D Nagamalai, C Dhinakaran…. 2007. ieeexplore.ieee.org … Engineering, 2007. MUE’ …31 cites.
  205. Virtual office environment“. O Tsatalos, S Karamanlakis. 2006. Google Patents US Patent App. 11/450,87531 cites.
  206. Occupationally related disorders“. DB Baker, PJ Landrigan. 1990. Elsevier Medical Clinics of North America31 cites.
  207. Statistical methods for stochastic differential equations“. M Kessler, A Lindner, M Sorensen. 2012. books.google.com 30 cites.
  208. Coinparty: Secure multi-party mixing of bitcoins“. JH Ziegeldorf, F Grossmann, M Henze…. 2015. dl.acm.org Proceedings of the 5th …30 cites.
  209. The blockchain as a software connector“. X Xu, C Pautasso, L Zhu, V Gramoli…. 2016. ieeexplore.ieee.org … (WICSA), 2016 13th …30 cites.
  210. Formalizing anonymous blacklisting systems“. R Henry, I Goldberg. 2011. ieeexplore.ieee.org Security and Privacy (SP), 2011 IEEE …30 cites.
  211. Secure content access and replication in pure p2p networks“. E Palomar, JME Tapiador, JC Hernandez-Castro…. 2008. Elsevier Computer …29 cites.
  212. Bitcoin: under the hood“. A Zohar. 2015. dl.acm.org Communications of the ACM28 cites.
  213. Caught in a web: Immigrant women and domestic violence“. DL Jang. 1994. HeinOnline Clearinghouse Rev.28 cites.
  214. The cryptoanarchists’ answer to cash“. ME Peck. 2012. ieeexplore.ieee.org IEEE Spectrum28 cites.
  215. Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems“. T Swanson. 2015. pdfs.semanticscholar.org Report, available online, Apr28 cites.
  216. Transparent data deduplication in the cloud“. F Armknecht, JM Bohli, GO Karame…. 2015. dl.acm.org Proceedings of the 22nd …28 cites.
  217. Egalitarianism and exclusion: US guest worker programs and a non-subordination approach to the labor-based admission of nonprofessional foreign national“. AJ Elmore. 2006. HeinOnline Geo. Immigr. LJ28 cites.
  218. Tendermint: Consensus without mining“. J Kwon. 2014. cdn.relayto.com Draft v. 0.6, fall27 cites.
  219. Email traffic: a quantitative snapshot.“. R Clayton. 2007. cl.cam.ac.uk CEAS27 cites.
  220. Spam zombies from outer space“. J Aycock, N Friess. 2006. dspace.ucalgary.ca 27 cites.
  221. Model-based adaptive dos attack mitigation“. C Barna, M Shtern, M Smit, V Tzerpos…. 2012. dl.acm.org Proceedings of the 7th …27 cites.
  222. Fairnet-How to counter free riding in peer-to-peer data structures“. E Buchmann, K Bohm. 2004. Springer Lecture Notes in Computer Science26 cites.
  223. Time-lock puzzles from randomized encodings“. N Bitansky, S Goldwasser, A Jain, O Paneth…. 2016. dl.acm.org Proceedings of the …26 cites.
  224. Migratory modernity and the cosmology of consumption in Côte d’Ivoire“. S Newell. 2005. books.google.com Migration and economy: Global and local dynamics26 cites.
  225. A study of geolocation databases“. Y Shavitt, N Zilberman. 2010. arxiv.org arXiv preprint arXiv:1005.567426 cites.
  226. The false premises and promises of Bitcoin“. BP Hanley. 2013. arxiv.org arXiv preprint arXiv:1312.204826 cites.
  227. On the privacy provisions of bloom filters in lightweight bitcoin clients“. A Gervais, S Capkun, GO Karame…. 2014. dl.acm.org Proceedings of the 30th …26 cites.
  228. Bitcoin: a first assessment“. D Woo. 2013. static.elitesecurity.org 26 cites.
  229. Survey on new solutions against distributed denial of service attacks“. C SUN, B Liu. 2009. en.cnki.com.cn Acta Electronica Sinica25 cites.
  230. Hybrid consensus: Efficient consensus in the permissionless model“. R Pass, E Shi. 2017. drops.dagstuhl.de LIPIcs-Leibniz International Proceedings in …25 cites.
  231. Cumulative Injury of Disease Claims: An Attempt to Define Employers’ Liability for Workers’ Compensation“. J LaDou, LE Mulryan, KJ McCarthy. 1980. HeinOnline Am. JL & Med.25 cites.
  232. Interdisciplinary writing“. D Hamilton. 1980. JSTOR College English25 cites.
  233. Bearing Witness to Economic Injustices of Undocumented Immigrant Families: A New Class of Undeserving Poor“. FJ Lipman. 2006. HeinOnline Nev. LJ25 cites.
  234. Difficulty control for blockchain-based consensus systems“. D Kraft. 2016. Springer Peer-to-Peer Networking and Applications25 cites.
  235. An analytical model for DDoS attacks and defense“. Y Xiang, W Zhou, Z Li. 2006. ieeexplore.ieee.org Computing in the Global Information …25 cites.
  236. Blockchain-the Gateway to Trust-Free Cryptographic Transactions.“. R Beck, JS Czepluch, N Lollike, S Malone. 2016. aisel.aisnet.org ECIS25 cites.
  237. The regulation of respiration during muscular work“. USV EULER, G Liljestrand. 1946. Wiley Online Library Acta Physiologica24 cites.
  238. Near field communications handbook“. SA Ahson, M Ilyas. 2011. books.google.com 24 cites.
  239. Time-Lock Puzzles in the Random Oracle Model.“. M Mahmoody, T Moran, SP Vadhan. 2011. Springer CRYPTO24 cites.
  240. On power splitting games in distributed computation: The case of bitcoin pooled mining“. L Luu, R Saha, I Parameshwaran…. 2015. ieeexplore.ieee.org … (CSF), 2015 IEEE …24 cites.
  241. Peer-to-Peer systems and applications“. K Wehrle, R Steinmetz. 2005. researchgate.net LNCS24 cites.
  242. Enforcing collaboration in peer-to-peer routing services“. T Moreton, A Twigg. 2003. Springer iTrust24 cites.
  243. Medrec: Using blockchain for medical data access and permission management“. A Azaria, A Ekblaw, T Vieira…. 2016. ieeexplore.ieee.org Open and Big Data (OBD …24 cites.
  244. Economics and security resource page“. R Anderson. 2005. cl.cam.ac.uk undated Web page. As of November24 cites.
  245. Proof-of-Work“. B Laurie, R Clayton. 2004. Proves Not to Work” WEAS23 cites.
  246. Re: Bitcoin P2P e-cash paper“. S Nakamoto. 2008. users.encs.concordia.ca The Cryptography Mailing List23 cites.
  247. Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees“. M Möser, R Böhme. 2015. Springer … Conference on Financial Cryptography and Data …23 cites.
  248. Towards Denial-of-Service-Resilient Key Agreement Protocols.“. D Stebila, B Ustaoglu. 2009. Springer ACISP23 cites.
  249. Towards mitigation of low and slow application ddos attacks“. M Shtern, R Sandel, M Litoiu, C Bachalo…. 2014. ieeexplore.ieee.org … (IC2E), 2014 IEEE …23 cites.
  250. A Survey of Attacks on Ethereum Smart Contracts (SoK)“. N Atzei, M Bartoletti, T Cimoli. 2017. Springer … Conference on Principles of Security and …23 cites.
  251. Central American immigrant workers and legal violence in Phoenix, Arizona“. C Menjívar. 2013. Springer Latino Studies23 cites.
  252. Preventing massive automated access to web resources“. A Basso, S Sicco. 2009. Elsevier computers & security23 cites.
  253. The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology“. W Mougayar. 2016. books.google.com 23 cites.
  254. Ouroboros: A provably secure proof-of-stake blockchain protocol“. A Kiayias, A Russell, B David, R Oliynykov. 2017. Springer Annual International …22 cites.
  255. Towards risk scoring of Bitcoin transactions“. M Möser, R Böhme, D Breuker. 2014. Springer International Conference on Financial …22 cites.
  256. Fruitchains: A fair blockchain“. R Pass, E Shi. 2017. dl.acm.org Proceedings of the ACM Symposium on Principles of …22 cites.
  257. Home media atomizer: remote sharing of home content-without semi-trusted proxies“. P Belimpasakis, S Moloney, V Stirbu…. 2008. ieeexplore.ieee.org IEEE Transactions …22 cites.
  258. An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design.“. HA Kalodner, M Carlsten, P Ellenbogen…. 2015. pdfs.semanticscholar.org WEIS22 cites.
  259. Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions“. A Miller, A Kosba, J Katz, E Shi. 2015. dl.acm.org Proceedings of the 22nd ACM SIGSAC …22 cites.
  260. Payment-Based Email.“. DA Turner, N Deng. 2004. cse.csusb.edu SNPD22 cites.
  261. Rhetoric of enrollment and acts of resistance: information technology as text“. M Wilson. 2003. Springer Global and organizational discourse about information …22 cites.
  262. Queue Management as a DoS counter-measure?“. D Boteanu, JM Fernandez, J McHugh, J Mullins. 2007. Springer ISC22 cites.
  263. The role of RFID in the mobile phone“. JCL Calvet. 2005. c.unik.no Telektronikk22 cites.
  264. New Kids on the Blockchain: How Bitcoin’s Technology Could Reinvent the Stock Market“. L Lee. 2015. HeinOnline Hastings Bus. LJ22 cites.
  265. Equihash: Asymmetric proof-of-work based on the generalized birthday problem“. A Biryukov, D Khovratovich. 2017. ledgerjournal.org Ledger21 cites.
  266. Blockchain thinking: The brain as a dac (decentralized autonomous organization)“. M Swan. 2015. the-blockchain.com Texas Bitcoin Conference21 cites.
  267. Beyond Cryptocurrencies-A Taxonomy of Decentralized Consensus Systems“. F Glaser, L Bezzenberger. 2015. papers.ssrn.com 21 cites.
  268. An adaptive authentication protocol based on reputation for peer-to-peer system“. H Lee, K Kim. 2003. caislab.kaist.ac.kr … on Cryptography and Information Security (SCIS)21 cites.
  269. Corda: An Introduction“. RG Brown, J Carlyle, I Grigg, M Hearn. 2016. researchgate.net R3 CEV, August21 cites.
  270. Reconstructing Hash Reversal based Proof of Work Schemes.“. J Green, J Juen, O Fatemieh, R Shankesi…. 2011. usenix.org LEET20 cites.
  271. Bitmessage: A peer-to-peer message authentication and delivery system“. J Warren. 2012. dropbox.curry.com white paper (27 November 2012), https://bitmessage …20 cites.
  272. A TorPath to TorCoin: proof-of-bandwidth altcoins for compensating relays“. M Ghosh, M Richardson, B Ford, R Jansen. 2014. dtic.mil 20 cites.
  273. The case for public work“. W Feng, E Kaiser. 2007. ieeexplore.ieee.org IEEE Global Internet Symposium, 200720 cites.
  274. An efficient confidentiality-preserving proof of ownership for deduplication“. L González-Manzano, A Orfila. 2015. Elsevier Journal of Network and Computer …20 cites.
  275. Publicly verifiable proofs of sequential work“. M Mahmoody, T Moran, S Vadhan. 2013. dl.acm.org … of the 4th conference on Innovations …20 cites.
  276. Security when people matter: structuring incentives for user behavior“. R Wash, JK MacKie-Mason. 2007. dl.acm.org … of the ninth international conference on …20 cites.
  277. Introduction to bitcoins: a pseudo-anonymous electronic currency system“. S Martins, Y Yang. 2011. dl.acm.org Proceedings of the 2011 Conference of the Center …20 cites.
  278. Keeping denial-of-service attackers in the dark“. G Badishi, A Herzberg, I Keidar. 2005. Springer International Symposium on Distributed …20 cites.
  279. Tradeoff cryptanalysis of memory-hard functions“. A Biryukov, D Khovratovich. 2014. Springer International Conference on the Theory and …20 cites.
  280. Analyzing the Deployment of Bitcoin’s P2P Network under an AS-level Perspective“. S Feld, M Schönfeld, M Werner. 2014. Elsevier Procedia Computer Science20 cites.
  281. Economics of blockchain“. S Davidson, P De Filippi, J Potts. 2016. papers.ssrn.com 20 cites.
  282. DaaS: DDoS mitigation-as-a-service“. SH Khor, A Nakao. 2011. ieeexplore.ieee.org Applications and the Internet (SAINT), 2011 …20 cites.
  283. SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains.“. L Luu, V Narayanan, K Baweja, C Zheng…. 2015. weusecoins.com IACR Cryptology …20 cites.
  284. A guided tour puzzle for denial of service prevention“. M Abliz, T Znati. 2009. ieeexplore.ieee.org Computer Security Applications Conference …20 cites.
  285. Moving Beyond Bitcoin to an Endogenous Theory of Decentralized Ledger Technology Regulation: An Initial Proposal“. CL Reyes. 2016. papers.ssrn.com 20 cites.
  286. Digital currencies, decentralized ledgers, and the future of central banking“. M Raskin, D Yermack. 2016. nber.org 20 cites.
  287. Some simple economics of the blockchain“. C Catalini, JS Gans. 2016. nber.org 20 cites.
  288. The Use of Calculations in Petrology: A study for students“. FF Grout. 1926. journals.uchicago.edu The Journal of Geology20 cites.
  289. Introduction to distributed hash tables“. E Rescorla, N Resonance. 2006. ietf.org IETF-65 Technical Plenary19 cites.
  290. The legal status of online currencies: are bitcoins the future?“. R Bollen. 2013. papers.ssrn.com Browser Download This Paper19 cites.
  291. Trusting records: is Blockchain technology the answer?“. VL Lemieux, VL Lemieux. 2016. emeraldinsight.com Records Management Journal19 cites.
  292. Hindering false event dissemination in VANETs with proof-of-work mechanisms“. E Palomar, JM de Fuentes, AI González-Tablas…. 2012. Elsevier … Research Part C …18 cites.
  293. On the feasibility of a censorship resistant decentralized name system“. M Wachs, M Schanzenbach, C Grothoff. 2014. Springer Foundations and Practice of …18 cites.
  294. Resource inflation threats to denial of service countermeasures“. R Shankesi, O Fatemieh, CA Gunter. 2010. ideals.illinois.edu 18 cites.
  295. When bitcoin mining pools run dry“. A Laszka, B Johnson, J Grossklags. 2015. Springer International Conference on Financial …18 cites.
  296. Formal modelling and automatic detection of resource exhaustion attacks“. B Groza, M Minea. 2011. dl.acm.org Proceedings of the 6th ACM Symposium on …17 cites.
  297. Challenges in protecting tor hidden services from botnet abuse“. N Hopper. 2014. Springer … Conference on Financial Cryptography and Data …17 cites.
  298. Bitcoin and beyond“. A Extance. 2015. nature.com Nature17 cites.
  299. An integrated approach to cryptographic mitigation of denial-of-service attacks“. J Rangasamy, D Stebila, C Boyd, JG Nieto. 2011. dl.acm.org Proceedings of the 6th ACM …17 cites.
  300. Can currency competition work?“. J Fernández-Villaverde, D Sanches. 2016. nber.org 17 cites.
  301. Using client puzzles to mitigate distributed denial of service attacks in the tor anonymous routing environment“. NA Fraser, DJ Kelly, RA Raines…. 2007. ieeexplore.ieee.org … , 2007. ICC’07. IEEE …17 cites.
  302. Questions related to Bitcoin and other Informational Money“. JA Bergstra, K de Leeuw. 2013. arxiv.org arXiv preprint arXiv:1305.595617 cites.
  303. IRCA’s antidiscrimination provisions: what went wrong?“. R Perotti. 1992. JSTOR International Migration Review17 cites.
  304. Analyzing Internet e-mail date-spoofing“. MT Banday, FA Mir, JA Qadri, NA Shah. 2011. Elsevier Digital Investigation17 cites.
  305. The IoT electric business model: Using blockchain technology for the internet of things“. Y Zhang, J Wen. 2017. Springer Peer-to-Peer Networking and Applications17 cites.
  306. The impact and potential of blockchain on securities transaction lifecycle“. M Mainelli, A Milne. 2016. papers.ssrn.com 17 cites.
  307. Bootstrapping Communications into an Anti-Censorship System.“. P Lincoln, I Mason, PA Porras, V Yegneswaran…. 2012. usenix.org FOCI16 cites.
  308. The politics of cryptography: Bitcoin and the ordering machines“. Q DuPont. 2014. hplusmagazine.com Journal of Peer Production16 cites.
  309. Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing.“. A Biryukov, D Dinu, D Khovratovich. 2015. eprint.iacr.org IACR Cryptology ePrint Archive16 cites.
  310. Pow-based distributed cryptography with no trusted setup“. M Andrychowicz, S Dziembowski. 2015. Springer Annual Cryptology Conference16 cites.
  311. Is disruptive blockchain technology the future of financial services?“. LJ Trautman. 2016. papers.ssrn.com 16 cites.
  312. mod_kaPoW: Mitigating DoS with transparent proof-of-work“. E Kaiser. 2007. dl.acm.org Proceedings of the 2007 ACM CoNEXT conference15 cites.
  313. Blackcoin’s proof-of-stake protocol v2“. P Vasin. 2014. blackcoin.co 15 cites.
  314. Bitcoin mining acceleration and performance quantification“. JA Dev. 2014. ieeexplore.ieee.org Electrical and Computer Engineering (CCECE), 2014 …15 cites.
  315. A survey of P2P Network security“. L Washbourne. 2015. arxiv.org arXiv preprint arXiv:1504.0135815 cites.
  316. Spam-I-am: A Proposal for Spam Control using Distributed Quota Management“. H Balakrishnan, D Karger. 2004. researchgate.net 3rd ACM SIGCOMM Workshop on Hot …15 cites.
  317. Performance Benchmarking of BPEL Engines: A Comparison Framework, Status Quo Evaluation and Challenges.“. C Röck, S Harrer, G Wirtz. 2014. ai2-s2-pdfs.s3.amazonaws.com SEKE15 cites.
  318. Demands and anxiety: The effects of the new immigration law“. CL Wolchok. 1997. HeinOnline Hum. Rts.15 cites.
  319. Building trust in storage outsourcing: Secure accounting of utility storage“. V Kher, Y Kim. 2007. ieeexplore.ieee.org … Distributed Systems, 2007. SRDS 2007. 26th …15 cites.
  320. Method and apparatus for using client puzzles to protect against denial-of-service attacks“. CL Schuba, E Guttman. 2005. Google Patents US Patent 6,944,66315 cites.
  321. Smart contracts, Bitcoin bots, and consumer protection“. J Fairfield. 2014. litigation-essentials.lexisnexis.com Wash. & Lee L. Rev. Online15 cites.
  322. Cryptofinance“. CR Harvey. 2016. papers.ssrn.com Browser Download This Paper15 cites.
  323. On the complexity of scrypt and proofs of space in the parallel random oracle model“. J Alwen, B Chen, C Kamath, V Kolmogorov…. 2016. Springer … Conference on the …15 cites.
  324. Cryptocurrencies as a disruption? empirical findings on user adoption and future potential of bitcoin and co“. AW Baur, J Bühler, M Bick, CS Bonorden. 2015. Springer … on e-Business, e-Services and …15 cites.
  325. Cryptocurrency value formation: An empirical study leading to a cost of production model for valuing bitcoin“. AS Hayes. 2017. Elsevier Telematics and Informatics15 cites.
  326. XFT: Practical Fault Tolerance beyond Crashes.“. S Liu, P Viotti, C Cachin, V Quéma, M Vukolic. 2016. usenix.org OSDI15 cites.
  327. Undocumented Workers and the NLRA:” Hoffman Plastic Compounds” and Beyond“. O Baird. 2003. JSTOR The Labor Lawyer15 cites.
  328. Collaborative use of individual search histories“. A Komlodi, WG Lutters. 2007. academic.oup.com Interacting with Computers15 cites.
  329. Throttling Outgoing SPAM for Webmail Services.“. Z Zhong, K Huang, K Li. 2005. pdfs.semanticscholar.org CEAS15 cites.
  330. Poverty, Social Exclusion and Ethnicity in Serbia and Montenegro: The Case of the Roma“. C Bodewig, A Sethi. 2005. www-wds.worldbank.org 15 cites.
  331. Криптовалюта как феномен современной информационной экономики: проблемы теоретического осмысления“. ДС Вахрушев, ОВ Железов. 2014. cyberleninka.ru Интернет-журнал Науковедение15 cites.
  332. An (almost) constant-effort solution-verification proof-of-work protocol based on merkle trees“. F Coelho. 2008. Springer Lecture Notes in Computer Science14 cites.
  333. It Will Cost You Nothing to’Kill’a Proof-of-Stake Crypto-Currency“. N Houy. 2014. papers.ssrn.com Browser Download This Paper14 cites.
  334. Can we stabilize the price of a Cryptocurrency?: Understanding the design of Bitcoin and its potential to compete with Central Bank money“. M Iwamura, Y Kitamura, T Matsumoto, K Saito. 2014. papers.ssrn.com 14 cites.
  335. Exploring the Bitcoin Network.“. A Baumann, B Fabian, M Lischke. 2014. academia.edu WEBIST (1)14 cites.
  336. Efficient and secure decentralized network size estimation“. N Evans, B Polot, C Grothoff. 2012. Springer NETWORKING 201214 cites.
  337. Bitcoin will bite the dust“. K Dowd, M Hutchinson. 2015. HeinOnline Cato J.14 cites.
  338. Bootstrapping trust in online dating: Social verification of online dating profiles“. G Norcie, E De Cristofaro, V Bellotti. 2013. Springer International Conference on Financial …14 cites.
  339. A security authentication method based on trust evaluation in VANETs“. A Zhou, J Li, Q Sun, C Fan, T Lei, F Yang. 2015. Springer EURASIP Journal on Wireless …14 cites.
  340. A robust mechanism for defending distributed denial of service attacks on web servers“. J Sen. 2011. arxiv.org arXiv preprint arXiv:1103.333314 cites.
  341. TorWard: Discovery of malicious traffic over Tor“. Z Ling, J Luo, K Wu, W Yu, X Fu. 2014. ieeexplore.ieee.org INFOCOM, 2014 Proceedings …14 cites.
  342. Fastpass: Providing first-packet delivery“. D Wendlandt, DG Andersen, A Perrig. 2006. repository.cmu.edu 14 cites.
  343. The rise of’Class Apartheid’in accessing secondary schools in Sandton, Gauteng“. J Bell, TM McKay. 2011. journals.co.za Southern African Review of Education with …14 cites.
  344. Blockchain for IoT security and privacy: The case study of a smart home“. A Dorri, SS Kanhere, R Jurdak…. 2017. ieeexplore.ieee.org Pervasive Computing …14 cites.
  345. On reverse-engineering S-Boxes with hidden design criteria or structure“. A Biryukov, L Perrin. 2015. Springer Annual Cryptology Conference14 cites.
  346. An agri-food supply chain traceability system for China based on RFID & blockchain technology“. F Tian. 2016. ieeexplore.ieee.org Service Systems and Service Management (ICSSSM) …14 cites.
  347. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams“. NZ Aitzhan, D Svetinovic. 2016. ieeexplore.ieee.org IEEE Transactions on Dependable …14 cites.
  348. Distributed Cryptography Based on the Proofs of Work.“. M Andrychowicz, S Dziembowski. 2014. eprint.iacr.org IACR Cryptology ePrint Archive13 cites.
  349. A simulation model for analysis of attacks on the bitcoin peer-to-peer network“. T Neudecker, P Andelfinger…. 2015. ieeexplore.ieee.org … Management (IM), 2015 …13 cites.
  350. Internet protocol adoption: Learning from Bitcoin“. R Böhme. 2013. informationsecurity.uibk.ac.at IAB Workshop on Internet Technology …13 cites.
  351. Deregulating the Market for Legal Services in the European Community: Freedom of Establishment and Freedom to Provide Services for EC Lawyers in the Federal …“. H Eidenmüller. 1990. Wiley Online Library The Modern Law Review13 cites.
  352. Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins“. T Ruffing, A Kate, D Schröder. 2015. dl.acm.org Proceedings of the 22nd ACM SIGSAC …13 cites.
  353. Controlling Spam by Secure Internet Content Selection.“. A Herzberg. 2004. Springer SCN13 cites.
  354. When your sensor earns money: exchanging data for cash with Bitcoin“. D Wörner, T von Bomhard. 2014. dl.acm.org Proceedings of the 2014 ACM International …13 cites.
  355. The blockchain anomaly“. C Natoli, V Gramoli. 2016. ieeexplore.ieee.org … and Applications (NCA), 2016 IEEE 15th …13 cites.
  356. Hiding the input-size in secure two-party computation“. Y Lindell, K Nissim, C Orlandi. 2013. Springer … Conference on the Theory and Application …13 cites.
  357. Taking a bit out of crime: Bitcoin and cross-border tax evasion“. T Slattery. 2014. HeinOnline Brook. J. Int’l L.13 cites.
  358. Research and challenges on bitcoin anonymity“. J Herrera-Joancomartí. 2015. Springer Data Privacy Management, Autonomous …13 cites.
  359. On Trees, Chains and Fast Transactions in the Blockchain.“. A Kiayias, G Panagiotakos. 2016. eprint.iacr.org IACR Cryptology ePrint Archive13 cites.
  360. Bitcoin: bubble or blockchain“. P Godsiff. 2015. Springer Agent and Multi-Agent Systems: Technologies and …13 cites.
  361. A multi-faceted approach towards spam-resistible mail“. MW Wu, Y Huang, SK Lu, Y Chen…. 2005. ieeexplore.ieee.org … 2005. Proceedings. 11th …13 cites.
  362. Cuckoo Cycle: a memory-hard proof-of-work system.“. J Tromp. 2014. ai2-s2-pdfs.s3.amazonaws.com IACR Cryptology ePrint Archive12 cites.
  363. Work Stealing for Time-constrained Octree Exploration: Application to Real-time 3D Modeling.“. LP Soares, C Ménier, B Raffin, JL Roch. 2007. moais.imag.fr EGPGV12 cites.
  364. Progress in cryptology—AFRICACRYPT 2008“. S Vaudenay. 2008. Springer First international conference on cryptology in Africa …12 cites.
  365. Blockchain contract: A complete consensus using blockchain“. H Watanabe, S Fujimura, A Nakadaira…. 2015. ieeexplore.ieee.org … (GCCE), 2015 IEEE …12 cites.
  366. Cryptocurrency and the Problem of Intermediation“. C Harwick. 2015. papers.ssrn.com 12 cites.
  367. Anti-vamming trust enforcement in peer-to-peer voip networks“. N Banerjee, S Saklikar, S Saha. 2006. dl.acm.org … of the 2006 international conference on …12 cites.
  368. Route bazaar: Automatic interdomain contract negotiation“. I Castro, A Panda, B Raghavan, S Shenker, S Gorinsky. 2015. usenix.org 12 cites.
  369. Harvesting verifiable challenges from oblivious online sources“. JA Halderman, B Waters. 2007. dl.acm.org Proceedings of the 14th ACM conference on …12 cites.
  370. Teaching Spam and Spyware at the University of C@ 1g4ry.“. J Aycock. 2006. academia.edu CEAS12 cites.
  371. The Next Generation of E-Verify: Getting Employment Verification Right“. DM Meissner, MR Rosenblum. 2009. ww.migrationinformation.net 12 cites.
  372. SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam“. H Tu, A Doupé, Z Zhao, GJ Ahn. 2016. ieeexplore.ieee.org Security and Privacy (SP) …12 cites.
  373. Negative influences of the disability compensation system: perspectives for the clinician“. JL Seres, RI Newman. 1983. thieme-connect.com Seminars in Neurology12 cites.
  374. Formal verification of smart contracts: Short paper“. K Bhargavan, A Delignat-Lavaud, C Fournet…. 2016. dl.acm.org Proceedings of the …12 cites.
  375. A cultural analysis of information technology offshore outsourcing: an exercise in multi-sited ethnography of virtual work“. T Eaton. 2011. digitalcommons.wayne.edu 12 cites.
  376. Controlled virtual resource access to mitigate economic denial of sustainability (edos) attacks against cloud infrastructures“. ZA Baig, F Binbeshr. 2013. ieeexplore.ieee.org … and Big Data (CloudCom-Asia), 2013 …12 cites.
  377. Blockchain thinking: The brain as a decentralized autonomous corporation [commentary]“. M Swan. 2015. ieeexplore.ieee.org IEEE Technology and Society Magazine12 cites.
  378. Experimental evaluations of expert and non-expert computer users’ mental models of security risks“. LJ Camp, F Asgharpour, D Liu…. 2007. researchgate.net Proceedings of WEIS …12 cites.
  379. Denial of service: prevention, modelling and detection“. J Smith. 2007. eprints.qut.edu.au 12 cites.
  380. Smart contract templates: foundations, design landscape and research directions“. CD Clack, VA Bakshi, L Braine. 2016. arxiv.org arXiv preprint arXiv:1608.0077112 cites.
  381. CORDON–a taxonomy of internet censorship resistance strategies“. T Elahi, I Goldberg. 2012. pdfs.semanticscholar.org University of Waterloo CACR12 cites.
  382. Bitcoin’s security model revisited“. Y Sompolinsky, A Zohar. 2016. arxiv.org arXiv preprint arXiv:1605.0919312 cites.
  383. Solidus: An incentive-compatible cryptocurrency based on permissionless Byzantine consensus“. I Abraham, D Malkhi, K Nayak, L Ren…. 2016. arxiv.org arXiv preprint arXiv …12 cites.
  384. Mirage: Towards deployable DDoS defense for web applications“. P Mittal, D Kim, YC Hu, M Caesar. 2011. arxiv.org arXiv preprint arXiv:1110.106012 cites.
  385. Managerial challenges of publicly funded principal investigators“. JA Cunningham, P O’Reilly, C O’Kane…. 2015. inderscienceonline.com International …12 cites.
  386. Bitcoin and the future of digital payments“. WJ Luther. 2015. papers.ssrn.com Browser Download This Paper12 cites.
  387. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies“. M Apostolaki, A Zohar…. 2016. pdfs.semanticscholar.org arXiv preprint arXiv …12 cites.
  388. Discovering bitcoin’s public topology and influential nodes“. A Miller, J Litton, A Pachulski, N Gupta, D Levin…. 2015. allquantor.at et al.12 cites.
  389. Do you get what you pay for? using proof-of-work functions to verify performance assertions in the cloud“. F Koeppe, J Schneider. 2010. ieeexplore.ieee.org Cloud Computing Technology and …11 cites.
  390. Performance comparison of executing fast transactions in bitcoin network using verifiable code execution“. P Singh, BR Chandavarkar, S Arora…. 2013. ieeexplore.ieee.org … (ADCONS), 2013 2nd …11 cites.
  391. Is Bitcoin the Only Cryptocurrency in the Town? Economics of Cryptocurrency and Friedrich A. Hayek“. M Iwamura, Y Kitamura, T Matsumoto. 2014. papers.ssrn.com 11 cites.
  392. A novel DDoS attack defending framework with minimized bilateral damages“. Y Chen, WS Ku, K Sakai…. 2010. ieeexplore.ieee.org … Conference (CCNC), 2010 …11 cites.
  393. Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.“. H Narasimhan, V Varadarajan, CP Rangan. 2010. Springer ISPEC11 cites.
  394. When cryptocurrencies mine their own business“. J Teutsch, S Jain, P Saxena. 2016. Springer … on Financial Cryptography and Data Security11 cites.
  395. The blockchain and kudos: A distributed system for educational record, reputation and reward“. M Sharples, J Domingue. 2016. Springer European Conference on Technology …11 cites.
  396. Blockchain challenges and opportunities: A survey“. Z Zheng, S Xie, HN Dai, H Wang. 2016. hongning.org Work Pap11 cites.
  397. Why buy when you can rent?“. J Bonneau. 2016. Springer … Conference on Financial Cryptography and Data …11 cites.
  398. Blockchain and its coming impact on financial services“. K Fanning, DP Centers. 2016. Wiley Online Library Journal of Corporate Accounting & …11 cites.
  399. twister-a P2P microblogging platform“. M Freitas. 2013. arxiv.org arXiv preprint arXiv:1312.715211 cites.
  400. A secure distance-based RFID identification protocol with an off-line back-end database“. P Peris-Lopez, A Orfila, E Palomar…. 2012. Springer Personal and Ubiquitous …11 cites.
  401. A bit of a problem: national and extraterritorial regulation of virtual currency in the age of financial disintermediation“. I Pflaum, E Hateley. 2013. HeinOnline Geo. J. Int’l L.11 cites.
  402. Ledgers and Law in the Blockchain“. Q DuPont, B Maurer. 2015. iqdupont.com Kings Review (23 June 2015) http://kingsreview …11 cites.
  403. Notes on a displaced womanhood: Albanian refugee women in Southern Italy“. DL Zinn, A Rivera. 1995. scholarworks.dlib.indiana.edu Anthropology of East Europe …11 cites.
  404. To bit or not to bit?[Bitcoin cryptocurrency]“. C Evans-Pughe, A Novikov, V Vitaliev. 2014. IET Engineering & Technology11 cites.
  405. Beyond bitcoin enabling smart government using blockchain technology“. S Ølnes. 2016. Springer … Conference on Electronic Government and the …11 cites.
  406. Homomorphic payment addresses and the pay-to-contract protocol“. I Gerhardt, T Hanke. 2012. arxiv.org arXiv preprint arXiv:1212.325711 cites.
  407. Augur: a decentralized, open-source platform for prediction markets“. J Peterson, J Krug. 2015. arxiv.org arXiv preprint arXiv:1501.0104211 cites.
  408. How to Build Time-Lock Encryption.“. T Jager. 2015. pdfs.semanticscholar.org IACR Cryptology ePrint Archive11 cites.
  409. Game of detections: how are security vulnerabilities discovered in the wild?“. M Hafiz, M Fang. 2016. Springer Empirical Software Engineering11 cites.
  410. Pay as you browse: microcomputations as micropayments in web-based services“. GO Karame, A Francillon, S Čapkun. 2011. dl.acm.org Proceedings of the 20th …11 cites.
  411. The honeynet quarantine: reducing collateral damage caused by early intrusion response“. B Todtmann, S Riebach…. 2007. ieeexplore.ieee.org Networking, 2007. ICN’07 …11 cites.
  412. The other side of the coin: User experiences with bitcoin security and privacy“. K Krombholz, A Judmayer, M Gusenbauer…. 2016. Springer … Conference on Financial …11 cites.
  413. DDoS attacks in service clouds“. S Alqahtani, RF Gamble. 2015. ieeexplore.ieee.org System Sciences (HICSS), 2015 48th …11 cites.
  414. Exponential Memory-Bound Functions for Proof of Work Protocols.“. F Coelho. 2005. cri.ensmp.fr IACR Cryptology ePrint Archive10 cites.
  415. Proof-of-work as anonymous micropayment: Rewarding a Tor relay“. A Biryukov, I Pustogarov. 2015. Springer … on Financial Cryptography and Data Security10 cites.
  416. Preventing network denial of service attacks using an accumulated proof-of-work approach“. M Baugher. 2009. Google Patents US Patent 7,600,25510 cites.
  417. kapow webmail: Effective disincentives against spam“. W Feng. 2010. Citeseer In Proc. of 7th CEAS10 cites.
  418. Blockchain contract: Securing a blockchain applied to smart contracts“. H Watanabe, S Fujimura, A Nakadaira…. 2016. ieeexplore.ieee.org … (ICCE), 2016 IEEE …10 cites.
  419. Secure business process modelling of SOA applications using” UML-SOA-Sec“. MQ Saleem, J Jaafar, MF Hassan. 2012. ijicic.org International Journal of Innovative …10 cites.
  420. Denial-of-service resistance in key establishment“. J Smith, S Tritilanunt, C Boyd…. 2007. inderscienceonline.com … Journal of Wireless …10 cites.
  421. A protocol for secure content distribution in pure p2p networks“. E Palomar, JM Estevez-Tapiador…. 2006. ieeexplore.ieee.org Database and Expert …10 cites.
  422. Making currency inexpensive with iOwe“. D Levin, A Schulman, K LaCurts…. 2011. pdfs.semanticscholar.org Proceedings of the …10 cites.
  423. Profit-driven abuses of virtual currencies“. DY Huang. 2013. pdfs.semanticscholar.org University of California, San Diego10 cites.
  424. Trustworthy routing with the AODV protocol“. AA Pirzada, A Datta, C Mcdonald. 2004. ieeexplore.ieee.org … Conference, 2004. INCC …10 cites.
  425. A taxonomy of cloud attack consequences and mitigation strategies: The Role of Access Control and Privileged Access Management“. KS Tep, B Martini, R Hunt…. 2015. ieeexplore.ieee.org Trustcom/BigDataSE/ISPA …10 cites.
  426. Finding and counting cliques and independent sets in r-uniform hypergraphs“. R Yuster. 2006. Elsevier Information Processing Letters10 cites.
  427. Towards a more democratic mining in bitcoins“. G Paul, P Sarkar, S Mukherjee. 2014. Springer International Conference on Information …10 cites.
  428. Bitcoin Developer Reference“. K Okupski. 2014. enetium.com Availabl e at http://enetium. com/resources/Bitcoin. pdf10 cites.
  429. A cloudlet-based multi-lateral resource exchange framework for mobile users“. Y Wu, L Ying. 2015. ieeexplore.ieee.org Computer Communications (INFOCOM), 2015 …10 cites.
  430. Hiding transaction amounts and balances in bitcoin“. E Androulaki, GO Karame. 2014. Springer International Conference on Trust and …10 cites.
  431. Certified bitcoins“. G Ateniese, A Faonio, B Magri…. 2014. Springer … Conference on Applied …10 cites.
  432. Pseudonymous secure computation from time-lock puzzles“. J Katz, A Miller, E Shi. 2014. ai2-s2-pdfs.s3.amazonaws.com 10 cites.
  433. Towards an Agenda for Information Systems Research on Digital Currencies and Bitcoin“. GM Giaglis, KN Kypriotaki. 2014. Springer International Conference on Business …10 cites.
  434. Disrupting governance: The new institutional economics of distributed ledger technology“. S Davidson, P De Filippi, J Potts. 2016. papers.ssrn.com 10 cites.
  435. What is bitcoin?“. D Hobson. 2013. dl.acm.org XRDS: Crossroads, The ACM Magazine for Students10 cites.
  436. Publishing without publishers: a decentralized approach to dissemination, retrieval, and archiving of data“. T Kuhn, C Chichester, M Krauthammer…. 2015. Springer International Semantic …10 cites.
  437. 20 Professional domains: Writing as creation of economic value“. EM Jakobs, C Spinuzzi. 2014. books.google.com Handbook of writing and text production10 cites.
  438. Privacy-aware architecture for sharing web histories“. A Tsow, C Viecco, LJ Camp. 2007. pdfs.semanticscholar.org IBM Systems Journal10 cites.
  439. CPV: Delay-based location verification for the Internet“. AR Abdou, A Matrawy…. 2017. ieeexplore.ieee.org IEEE Transactions on …10 cites.
  440. Peer-to-peer security“. A Friedman, LJ Camp. 2005. pdfs.semanticscholar.org The Handbook of Information …10 cites.
  441. mod kapow: Protecting the web with transparent proof-of-work“. E Kaiser, W Feng. 2008. ieeexplore.ieee.org INFOCOM Workshops 2008, IEEE9 cites.
  442. The hashcash proof-of-work function“. A Back. 2003. Draft-Hashcash-back-00, Internet-Draft Created,(Jun …9 cites.
  443. Worker’s compensation law and the compensability of mental injuries.“. KJ Merrikin, TD Overcast, BD Sales. 1982. psycnet.apa.org Health Psychology9 cites.
  444. Issues in initializing security“. N Asokan, L Tarkkala. 2005. ieeexplore.ieee.org … , 2005. Proceedings of the Fifth IEEE …9 cites.
  445. Attribute-based Credentials for Trust“. K Rannenberg, J Camenisch, A Sabouri. 2015. Springer Identity in the Information …9 cites.
  446. How well can congestion pricing neutralize denial of service attacks?“. A Vulimiri, GA Agha, PB Godfrey…. 2012. dl.acm.org ACM SIGMETRICS …9 cites.
  447. Introduction to the Special Issue on “Data management in vehicular networks”“. T Delot, S Ilarri. 2012. Pergamon 9 cites.
  448. Professional Certification: A Study of Significance.“. JM Ulmer. 2010. atmae.org Journal of industrial technology9 cites.
  449. Retricoin: Bitcoin based on compact proofs of retrievability“. B Sengupta, S Bag, S Ruj, K Sakurai. 2016. dl.acm.org Proceedings of the 17th …9 cites.
  450. Identity loan: The moral economy of migrant document exchange in California’s Central Valley“. S Horton. 2015. Wiley Online Library American Ethnologist9 cites.
  451. A p2p content authentication protocol based on byzantine agreement“. E Palomar, J Estevez-Tapiador…. 2006. Springer Emerging Trends in …9 cites.
  452. An analysis of the Bitcoin electronic cash system“. D Drainville. 2012. pdfs.semanticscholar.org … Waterloo, ON, Canada, Canada, Tech. Rep9 cites.
  453. Using rhythmic nonces for puzzle-based dos resistance“. EM Chan, CA Gunter, S Jahid, E Peryshkin…. 2008. dl.acm.org Proceedings of the 2nd …9 cites.
  454. Blockstack: Design and implementation of a global naming system with blockchains“. M Ali, J Nelson, R Shea, MJ Freedman. 2016. the-blockchain.com Last visited on9 cites.
  455. Bitcoin clients“. R Skudnov. 2012. theseus.fi 9 cites.
  456. The blockchain-based digital content distribution system“. J Kishigami, S Fujimura, H Watanabe…. 2015. ieeexplore.ieee.org Big Data and Cloud …9 cites.
  457. On trustworthiness of cpu usage metering and accounting“. M Liu, X Ding. 2010. ieeexplore.ieee.org … ), 2010 IEEE 30th International Conference on9 cites.
  458. Double Spending Protection for E-Cash Based on Risk Management.“. P Everaere, I Simplot-Ryl, I Traoré. 2010. Springer ISC9 cites.
  459. A Blockchain-Based Approach to Health Information Exchange Networks“. K Peterson, R Deeduvanu, P Kanjamala, K Boles. 2016. colleaga.org 9 cites.
  460. Increasing anonymity in Bitcoin“. A Saxena, J Misra, A Dhar. 2014. Springer … on Financial Cryptography and Data Security9 cites.
  461. On non-parallelizable deterministic client puzzle scheme with batch verification modes“. Q Tang, A Jeckmans. 2010. doc.utwente.nl 9 cites.
  462. Blockchain platform for industrial Internet of Things“. A Bahga, VK Madisetti. 2016. file.scirp.org J. Softw. Eng. Appl9 cites.
  463. A review of techniques to counter spam and spit“. A Nakulas, L Ekonomou, S Kourtesi, GP Fotis…. 2009. Springer Proceedings of the …9 cites.
  464. On the Security and Scalability of Bitcoin’s Blockchain“. G Karame. 2016. dl.acm.org Proceedings of the 2016 ACM SIGSAC Conference on …9 cites.
  465. A PRELIMINARY REPORT ON THE SO‐CALLED “BANNERSTONES”“. JL Baer. 1921. Wiley Online Library American Anthropologist9 cites.
  466. The blockchain phenomenon“. J Mattila. 2016. researchgate.net … The Blockchain Phenomenon'(Berkeley Roundtable of …9 cites.
  467. A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology“. J Herbert, A Litchfield. 2015. aut.researchgateway.ac.nz Proceedings of the 38th …9 cites.
  468. Bitcoin‐Based Decentralized Carbon Emissions Trading Infrastructure Model“. E Al Kawasmi, E Arnautovic…. 2015. Wiley Online Library Systems …9 cites.
  469. Scripting smart contracts for distributed ledger technology.“. PL Seijas, SJ Thompson…. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint …9 cites.
  470. Towards a novel privacy-preserving access control model based on blockchain technology in IoT“. A Ouaddah, AA Elkalam, AA Ouahman. 2017. Springer Europe and MENA Cooperation …9 cites.
  471. Offline submission with rsa time-lock puzzles“. YI Jerschow, M Mauve. 2010. ieeexplore.ieee.org Computer and Information Technology …9 cites.
  472. Verification methods and apparatus for use in providing application services to mobile communication devices“. A Sherkin, WD Franco. 2013. Google Patents US Patent 8,386,7739 cites.
  473. Depth-robust graphs and their cumulative memory complexity“. J Alwen, J Blocki, K Pietrzak. 2017. Springer … International Conference on the Theory and …9 cites.
  474. An Empirical Study of Textual Key-Fingerprint Representations.“. S Dechand, D Schürmann, K Busse, Y Acar…. 2016. usenix.org USENIX Security …9 cites.
  475. 一种认证协议防御拒绝服务攻击的设计方法“. 卫剑钒, 陈钟, 段云所, 王立福. 2005. 电子学报9 cites.
  476. Distributed consensus from proof of stake is impossible“. A Poelstra. 2014. download.wpsoftware.net 8 cites.
  477. A Provably Secure Proof-of-Stake Blockchain Protocol.“. A Kiayias, I Konstantinou, A Russell, B David…. 2016. allquantor.at IACR Cryptology …8 cites.
  478. The economics of information security and privacy“. R Böhme. 2013. Springer 8 cites.
  479. Bitdeposit: Deterring attacks and abuses of cloud computing services through economic measures“. J Szefer, RB Lee. 2013. ieeexplore.ieee.org Cluster, Cloud and Grid Computing (CCGrid) …8 cites.
  480. Installation of an Application Module and a Temporary Certificate“. SK Agrawal, T Foucher, WO Pereira…. 2006. Google Patents US Patent App. 11 …8 cites.
  481. Interest cash: an application-based countermeasure against interest flooding for dynamic content in named data networking“. Z Li, J Bi. 2014. dl.acm.org Proceedings of The Ninth International Conference on …8 cites.
  482. Feedback based Reputation on top of the Bitcoin Blockchain“. D Carboni. 2015. arxiv.org arXiv preprint arXiv:1502.015048 cites.
  483. Tailored security: Building nonrepudiable security service-level agreements“. T Takahashi, J Kannisto, J Harju…. 2013. ieeexplore.ieee.org IEEE Vehicular …8 cites.
  484. The case for network witnesses“. W Feng, T Schluessler. 2008. ieeexplore.ieee.org … , 2008. NPSec 2008. 4th Workshop on8 cites.
  485. ZombieCoin: powering next-generation botnets with bitcoin“. ST Ali, P McCorry, PHJ Lee, F Hao. 2015. Springer International Conference on Financial …8 cites.
  486. The bitcoin backbone protocol with chains of variable difficulty“. J Garay, A Kiayias, N Leonardos. 2017. Springer Annual International Cryptology …8 cites.
  487. Strengthening password-based authentication protocols against online dictionary attacks“. P Wang, Y Kim, V Kher, T Kwon. 2005. Springer International Conference on Applied …8 cites.
  488. A tale of twin tech: Bitcoin and the www“. D Folkinshteyn, MM Lennon, T Reilly. 2015. papers.ssrn.com 8 cites.
  489. A survey of mitigation techniques against Economic Denial of Sustainability (EDoS) attack on cloud computing architecture“. P Singh, S Manickam…. 2014. ieeexplore.ieee.org … , Infocom Technologies and …8 cites.
  490. Useful password hashing: how to waste computing cycles with style“. M Dürmuth. 2013. dl.acm.org Proceedings of the 2013 workshop on New security …8 cites.
  491. The lone parents pilots: a qualitative evaluation of quarterly work focused interviews (12+), work search premium and in work credit“. K Ray, S Vegeris, S Brooks, V Campbell-Barr…. 2007. eprints.wmin.ac.uk 8 cites.
  492. How to vote privately using bitcoin“. Z Zhao, THH Chan. 2015. Springer International Conference on Information and …8 cites.
  493. The Revolution will (not) be Decentralized: Blockchains“. R O’Dwyer. 2015. the-blockchain.com Commons Transition8 cites.
  494. Digitalisation in payments: From interoperability to centralised models?“. U Milkau, J Bott. 2015. ingentaconnect.com Journal of Payments Strategy & Systems8 cites.
  495. Bitcoin and modern alchemy: in code we trust“. J Simser. 2015. emeraldinsight.com Journal of Financial Crime8 cites.
  496. Denial of Service Elusion (DoSE): Keeping clients connected for less“. P Wood, C Gutierrez, S Bagchi. 2015. ieeexplore.ieee.org Reliable Distributed Systems …8 cites.
  497. Strategies and heuristics for novice instructional designers as they work with faculty content experts in a university setting“. M Liu, C Kishi, S Rhodes. 2007. igi-global.com … design: Case studies in communities of …8 cites.
  498. Further applications of the blockchain“. G Foroglou, AL Tsilidou. 2015. researchgate.net 12th Student Conference on Managerial …8 cites.
  499. Reconciliation and Conciliation: The Irreconcilable Dilemma of the 1965’Equal’Wage Case for Aboriginal Station Workers“. T Anthony. 2007. JSTOR Labour History8 cites.
  500. A faster Bitcoin network“. C Stathakopoulou, C Decker…. 2015. pub.tik.ee.ethz.ch Tech. rep., ETH, Zurich …8 cites.
  501. Protocol engineering for protection against Denial-of-Service attacks“. S Tritilanunt. 2009. eprints.qut.edu.au 8 cites.
  502. Cryptocash, cryptocurrencies, and cryptocontracts“. N Koblitz, AJ Menezes. 2016. Springer Designs, Codes and Cryptography8 cites.
  503. Optimal Hackback“. JP Kesan, R Majuca. 2009. HeinOnline Chi.-Kent L. Rev.8 cites.
  504. Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption.“. A Lysyanskaya, A Segal. 2010. cs.brown.edu IACR Cryptology ePrint Archive8 cites.
  505. Economic Analysis of Cryptocurrency Backed Money Laundering.“. C Brenig, R Accorsi, G Müller. 2015. aisel.aisnet.org ECIS8 cites.
  506. Standing on the Shoulders of Giants: Are ERP success factors relevant for EDRMS Implementation?“. TL Nguyen, P Swatman, B Fraunholz. 2008. aisel.aisnet.org BLED 2008 Proceedings8 cites.
  507. Blockchain application and outlook in the banking industry“. Y Guo, C Liang. 2016. Springer Financial Innovation8 cites.
  508. Social trust of virtual identities“. JM Seigneur. 2009. Springer Computing with Social Trust8 cites.
  509. Blockchain-based secure firmware update for embedded devices in an Internet of Things environment“. B Lee, JH Lee. 2017. Springer The Journal of Supercomputing8 cites.
  510. An empirical analysis of smart contracts: platforms, applications, and design patterns“. M Bartoletti, L Pompianu. 2017. arxiv.org arXiv preprint arXiv:1703.063228 cites.
  511. Helping ticketmaster: Changing the economics of ticket robots with geographic proof-of-work“. E Kaiser, W Feng. 2010. ieeexplore.ieee.org INFOCOM IEEE Conference on Computer …7 cites.
  512. Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin“. M Bastiaan. 2015. fmt.cs.utwente.nl … -of-two-phase-proof-of-work-in-bitcoin. pdf7 cites.
  513. Countermeasures against sybil attacks in wsn based on proofs-of-work“. M Klonowski, MB Koza. 2013. dl.acm.org Proceedings of the sixth ACM conference on …7 cites.
  514. Proof of stake velocity: Building the social currency of the digital age“. L Ren. 2014. coss.io Self-published white paper7 cites.
  515. Blockchain Technology: What is it good for?“. SH Ammous. 2016. papers.ssrn.com Browser Download This Paper7 cites.
  516. Spam, phishing, and the looming challenge of big botnets“. R Hemmingsen, J Aycock, M Jacobson Jr. 2007. prism.ucalgary.ca 7 cites.
  517. Addressing Security issues in Cloud Computing“. R Dubey, MA Jamshed, X Wang, RK Batalla. 0. Technical Report, Carnegie Mellon …7 cites.
  518. In blocks [security bitcoin]“. D Bradbury. 2015. ieeexplore.ieee.org Engineering & Technology7 cites.
  519. Business Data Communications and Networking: A Research Perspective: A Research Perspective“. J Gutierrez. 2006. books.google.com 7 cites.
  520. Towards reference architecture for cryptocurrencies: Bitcoin architectural analysis“. I Alqassem, D Svetinovic. 2014. ieeexplore.ieee.org … IEEE and Cyber, Physical and Social …7 cites.
  521. Trend of centralization in Bitcoin’s distributed network“. A Beikverdi, JS Song. 2015. ieeexplore.ieee.org Software Engineering, Artificial …7 cites.
  522. Work experience in PAIS–concepts, measurements and potentials“. S Kabicher-Fuchs, S Rinderle-Ma. 2012. Springer Advanced Information Systems …7 cites.
  523. P2P economies“. E Peserico. 2006. conferences.sigcomm.org Proceedings of the ACM Special Interest …7 cites.
  524. An analysis of the cryptocurrency industry“. R Farell. 2015. repository.upenn.edu 7 cites.
  525. Rational zero: Economic security for zerocoin with everlasting anonymity“. C Garman, M Green, I Miers, AD Rubin. 2014. Springer International Conference on …7 cites.
  526. Purely P2P crypto-currency with finite mini-blockchain“. JD Bruce. 2013. pdfs.semanticscholar.org 7 cites.
  527. Identification and control of work-related diseases: report of a WHO expert committee [meeting held in Geneva from 28 November to 2 December 1983]“. World Health Organization. 1985. apps.who.int 7 cites.
  528. Blockchain Double Bubble or Double Trouble?“. J Umeh. 2016. academic.oup.com ITNOW7 cites.
  529. Contribution to the study of multiple-valued bent functions“. C Moraga, M Stankovic, RS Stankovic…. 2013. ieeexplore.ieee.org Multiple-Valued Logic …7 cites.
  530. Identifying and Characterizing Sybils in the Tor Network.“. P Winter, R Ensafi, K Loesing, N Feamster. 2016. usenix.org USENIX Security …7 cites.
  531. Overview of business innovations and research opportunities in blockchain and introduction to the special issue“. JL Zhao, S Fan, J Yan. 2016. jfin-swufe.springeropen.com Financial Innovation7 cites.
  532. Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.“. B Groza, B Warinschi. 2012. Springer ISC7 cites.
  533. Sybil-resistant pseudonymization and pseudonym change without trusted third parties“. M Florian, J Walter, I Baumgart. 2015. dl.acm.org Proceedings of the 14th ACM Workshop …7 cites.
  534. Cost-based and time-based analysis of DoS-resistance in HIP“. S Tritilanunt, C Boyd, E Foo, JMG Nieto. 2007. dl.acm.org Proceedings of the thirtieth …7 cites.
  535. An Analysis of Bitcoin Exchange Rates“. JB Smith. 2016. papers.ssrn.com Browser Download This Paper7 cites.
  536. HTTPreject: handling overload situations without losing the contact to the user“. J Schneider, S Koch. 2010. ieeexplore.ieee.org Computer Network Defense (EC2ND) …7 cites.
  537. Making contribution-aware p2p systems robust to collusion attacks using bandwidth puzzles“. MK Reiter, V Sekar, Z Zhang. 2008. reports-archive.adm.cs.cmu.edu … Report CMU-CS …7 cites.
  538. Darkcoin: PeertoPeer CryptoCurrency with Anonymous Blockchain Transactions and an Improved ProofofWork System“. E Duffield, K Hagan. 2014. pdfs.semanticscholar.org Mar-2014 [Online]. Available: https …7 cites.
  539. On the Memory-Hardness of Data-Independent Password-Hashing Functions.“. J Alwen, P Gazi, C Kamath, K Klein…. 2016. pdfs.semanticscholar.org IACR Cryptology …7 cites.
  540. New kids on the block: an analysis of modern blockchains“. L Anderson, R Holz, A Ponomarev, P Rimba…. 2016. arxiv.org arXiv preprint arXiv …7 cites.
  541. The merits of a meritocracy in open source software ecosystems“. E Eckhardt, E Kaats, S Jansen, C Alves. 2014. dl.acm.org Proceedings of the 2014 …7 cites.
  542. Blockchain temporality: smart contract time specifiability with blocktime“. M Swan. 2016. Springer International symposium on rules and rule markup …7 cites.
  543. Blockchain in internet of things: challenges and solutions“. A Dorri, SS Kanhere, R Jurdak. 2016. arxiv.org arXiv preprint arXiv:1608.051877 cites.
  544. Exploring miner evolution in bitcoin network“. L Wang, Y Liu. 2015. Springer International Conference on Passive and Active …7 cites.
  545. Redactable blockchain–or–rewriting history in bitcoin and friends“. G Ateniese, B Magri, D Venturi…. 2017. ieeexplore.ieee.org Security and Privacy …7 cites.
  546. Can we make email secure?“. D Bradbury. 2014. Elsevier Network Security7 cites.
  547. A Case Study for Blockchain in Healthcare:“MedRec” prototype for electronic health records and medical research data“. A Ekblaw, A Azaria, JD Halamka…. 2016. healthit.gov … of IEEE Open & Big Data …7 cites.
  548. Transparency overlays and applications“. M Chase, S Meiklejohn. 2016. dl.acm.org Proceedings of the 2016 ACM SIGSAC …7 cites.
  549. Refund attacks on Bitcoin’s Payment Protocol“. P McCorry, SF Shahandashti, F Hao. 2016. Springer International Conference on …7 cites.
  550. Dynamic common law and technological change: the classification of Bitcoin“. S Bayern. 2014. HeinOnline Wash. & Lee L. Rev. Online7 cites.
  551. Introduction to bitcoin“. LP Nian, DLK Chuen. 2015. books.google.com Handbook of Digital Currency: Bitcoin …7 cites.
  552. Preventing spam in publish/subscribe“. S Tarkoma. 2006. ieeexplore.ieee.org … Workshops, 2006. ICDCS Workshops 2006. 26th …7 cites.
  553. AnonRep: Towards Tracking-Resistant Anonymous Reputation.“. E Zhai, DI Wolinsky, R Chen, E Syta, C Teng, B Ford. 2016. usenix.org NSDI7 cites.
  554. The invisible politics of bitcoin: governance crisis of a decentralized infrastructure“. P De Filippi, B Loveluck. 2016. papers.ssrn.com 7 cites.
  555. Low-Back Pain Disorders as Occupational Diseases in the Czech Republic and 22 European Countries: Comparison of National Systems, Related Diagnoses and …“. A Lastovková, M Nakládalová…. 2015. search.proquest.com … European journal of …7 cites.
  556. Emergence of FinTech and the LASIC principles“. DKC Lee, EGS Teo. 2015. papers.ssrn.com 7 cites.
  557. Can’t Buy Me Love: Funding Marriage Promotion Versus Listening to Real Needs in Breaking the Cycle of Poverty“. A Parker. 2008. HeinOnline S. Cal. Rev. L. & Soc. Just.7 cites.
  558. Can’t Buy Me Love: Funding Marriage Promotion Versus Listening to Real Needs in Breaking the Cycle of Poverty“. A Parker. 2008. HeinOnline S. Cal. Rev. L. & Soc. Just.7 cites.
  559. Security for medical sensor networks in mobile health systems“. I Nikolaevskiy, D Korzun…. 2014. ieeexplore.ieee.org World of Wireless, Mobile …7 cites.
  560. Free-riding prevention in super-peer desktop grids“. P Merz, F Kolter, M Priebe. 2008. ieeexplore.ieee.org Computing in the Global …7 cites.
  561. Congestion games with multisets of resources and applications in synthesis“. G Avni, O Kupferman, T Tamir. 2015. drops.dagstuhl.de LIPIcs-Leibniz International …7 cites.
  562. Российский туризм в «новой реальности»: постановка проблемы“. ЕА Джанджугазова. 2015. cyberleninka.ru Российские регионы: взгляд в будущее7 cites.
  563. О подходах в международном регулировании криптовалют (Bitcoin) в отдельных иностранных юрисдикциях“. ВА Кузнецов, АВ Якубов. 2016. cbr.ru Деньги и кредит7 cites.
  564. Cuckoo Cycle: a memory bound graph-theoretic proof-of-work“. J Tromp. 2015. Springer … Conference on Financial Cryptography and Data …6 cites.
  565. Overcoming reputation and proof-of-work systems in botnets“. A White, A Tickle, A Clark. 2010. ieeexplore.ieee.org Network and System Security (NSS) …6 cites.
  566. Lazy Susan: dumb waiting as proof of work“. J Crowcroft, T Deegan, C Kreibich, R Mortier, N Weaver. 2007. cl.cam.ac.uk 6 cites.
  567. Proof of Luck: An efficient Blockchain consensus protocol“. M Milutinovic, W He, H Wu, M Kanwal. 2016. dl.acm.org … of the 1st Workshop on System …6 cites.
  568. Identifying Legitimate Clients under Distributed Denial-of-Service Attacks“. S Simpson, AT Lindsay…. 2010. ieeexplore.ieee.org Network and System …6 cites.
  569. Blockchain for the Internet of Things: A systematic literature review“. M Conoscenti, A Vetrò, JC De Martin. 2016. porto.polito.it 6 cites.
  570. Understanding work disability systems and intervening upstream“. E MacEachen. 2013. Springer Handbook of work disability6 cites.
  571. Blind signatures for bitcoin transaction anonymity“. W Ladd. 2012. pdfs.semanticscholar.org 6 cites.
  572. Proofs of Space-Time and Rational Proofs of Storage.“. T Moran, I Orlov. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint Archive6 cites.
  573. Extending existing blockchains with virtualchain“. J Nelson, M Ali, R Shea…. 2016. zurich.ibm.com Workshop on Distributed …6 cites.
  574. Work Value“. JR Kerr. 1964. journals.sagepub.com Journal of Industrial Relations6 cites.
  575. CAD-coin versus Fedcoin“. R Garratt. 2016. r3cev.com R3 Report6 cites.
  576. Work “Only a Woman Can DO”: The Women’s Division of the Canadian Department of Immigration and Colonization, 1920–1937“. R Mancuso. 2005. Taylor & Francis American Review of Canadian Studies6 cites.
  577. Understanding Bitcoins: facts and questions“. BS Albuquerque, MC Callado. 2015. SciELO Brasil Revista Brasileira de Economia6 cites.
  578. There are two sides to every coin—even to the bitcoin, a virtual currency“. MA Arias, Y Shin. 2013. stlouisfed.org The Regional Economist6 cites.
  579. Quantum bitcoin: An anonymous and distributed currency secured by the no-cloning theorem of quantum mechanics“. J Jogenfors. 2016. arxiv.org arXiv preprint arXiv:1604.013836 cites.
  580. Binary tree based public-key management for mobile ad hoc networks“. G Kambourakis, E Konstantinou…. 2008. ieeexplore.ieee.org … Systems. 2008. ISWCS’ …6 cites.
  581. OnionDNS: A seizure-resistant top-level domain“. N Scaife, H Carter, P Traynor. 2015. ieeexplore.ieee.org Communications and Network …6 cites.
  582. 32. Accounting in Peer-to-Peer-Systems“. NC Liebau, V Darlagiannis, O Heckmann…. 2005. Springer Peer-to-Peer Systems …6 cites.
  583. A biologically inspired method of spam detection“. P Gardner-Stephen. 2009. ieeexplore.ieee.org … Systems Application, 2009. DEXA’09. 20th …6 cites.
  584. A Survey of anonymous blacklisting systems“. R Henry, I Goldberg. 2010. pdfs.semanticscholar.org University of Waterloo, Centre for …6 cites.
  585. Financial Cryptography and Data Security“. J Clark, A Essex. 2016. Springer 6 cites.
  586. Safety analysis of Bitcoin improvement proposals“. E Anceaume, T Lajoie-Mazenc…. 2016. ieeexplore.ieee.org … (NCA), 2016 IEEE …6 cites.
  587. Pressure from the inside: The subnational politics of immigration“. Á García, K Griesbach, J Andrade…. 2011. academia.edu … , Rafael Alarcón y …6 cites.
  588. The community behavior of spammers“. F Li, H Mo-Han, G Pawel. 2011. olsonet.com 6 cites.
  589. Bitcoin mining technology“. ND Bhaskar, DLEEK Chuen. 2015. books.google.com Handbook of Digital Currency …6 cites.
  590. Secure communication via shared knowledge and a salted hash in ad-hoc environments“. AD Kent, LM Liebrock. 2011. ieeexplore.ieee.org Computer Software and Applications …6 cites.
  591. Bitcoin covenants“. M Möser, I Eyal, EG Sirer. 2016. Springer … on Financial Cryptography and Data Security6 cites.
  592. Validation of application behavior on a virtual time integrated network emulation testbed“. Y Zheng, D Jin, DM Nicol. 2012. dl.acm.org Proceedings of the Winter Simulation …6 cites.
  593. Blockchain-based architectures for the internet of things: a survey“. M Atzori. 2016. papers.ssrn.com 6 cites.
  594. Cryptocurrencies as distributed community experiments“. M Tarasiewicz, A Newman. 2015. books.google.com Handbook of digital currency6 cites.
  595. The economics of the bitcoin system“. GH Popescu. 2014. ceeol.com Psychosociological Issues in Human Resource …6 cites.
  596. Could bitcoin be a financial solution for developing economies“. AG Clegg. 2014. cs.bham.ac.uk University of Birmingham6 cites.
  597. Algorand: Scaling byzantine agreements for cryptocurrencies“. Y Gilad, R Hemo, S Micali, G Vlachos…. 2017. people.csail.mit.edu In Proceedings of the …6 cites.
  598. Challenges and opportunities associated with a bitcoin-based transaction rating system“. D Vandervort. 2014. Springer … Conference on Financial Cryptography and Data …6 cites.
  599. Using network traffic to infer hardware state: A kernel-level investigation“. L Watkins, WH Robinson, R Beyah. 2015. dl.acm.org ACM Transactions on Embedded …6 cites.
  600. Throttling DDoS attacks using discrete logarithm problem“. A Darapureddi, R Mohandas…. 2010. ieeexplore.ieee.org … ), Proceedings of the …6 cites.
  601. System and methods for protecting against denial of service attacks“. WC Feng. 2012. Google Patents US Patent 8,171,5626 cites.
  602. Distributing trusted third parties“. A Küpçü. 2013. dl.acm.org ACM SIGACT News6 cites.
  603. Dependable connection setup for network capabilities“. SB Lee, VD Gligor, A Perrig. 2010. ieeexplore.ieee.org Dependable Systems and …6 cites.
  604. Balloon hashing: A memory-hard function providing provable protection against sequential attacks“. D Boneh, H Corrigan-Gibbs, S Schechter. 2016. Springer International Conference on …6 cites.
  605. Explicit optimal binary pebbling for one-way hash chain reversal“. B Schoenmakers. 2016. Springer … Conference on Financial Cryptography and Data …6 cites.
  606. Market design for trading with blockchain technology“. K Malinova, A Park. 2016. blockchain.cs.ucl.ac.uk Unpublished manuscript, University of …6 cites.
  607. Modeling and Simulation of the Economics of Mining in the Bitcoin Market“. L Cocco, M Marchesi. 2016. journals.plos.org PloS one6 cites.
  608. Immigration Reform Fuels Employment Discrimination“. N Prescott. 2006. HeinOnline Drake L. Rev.6 cites.
  609. Beyond Bitcoin-Part I: A critical look at blockchain-based systems.“. P Forte, D Romano, G Schmid. 2015. academia.edu IACR Cryptology ePrint Archive6 cites.
  610. Privacy in bitcoin transactions: new challenges from blockchain scalability solutions“. J Herrera-Joancomartí, C Pérez-Solà. 2016. Springer Modeling Decisions for Artificial …6 cites.
  611. The sleepy model of consensus“. R Pass, E Shi. 2016. eprint.iacr.org 6 cites.
  612. 6lowdtn: Ipv6-enabled delay-tolerant wsns for contiki“. L Bruno, M Franceschinis, C Pastrone…. 2011. ieeexplore.ieee.org … Computing in Sensor …6 cites.
  613. John MacCulloch, blackguard, thief and high priest, reassessed“. DA Cumming. 1985. euppublishing.com Archives of Natural History6 cites.
  614. The memory-hard Argon2 password hash and proof-of-work function“. A Biryukov, D Dinu, D Khovratovich…. 2016. Internet-Draft draft-irtf-cfrg-argon2-00 … 5 cites.
  615. Primecoin: Cryptocurrency with prime number proof-of-work, July 2013“. S King. 2013. URL https://www. primecoin. org/static/primecoin-paper …5 cites.
  616. Primecoin: cryptocurrency with prime number proof-of-work (2013)“. S King. 2013. . 5 cites.
  617. Bitcoin Message: Data Insertion on a Proof-of-Work Cryptocurrency System“. MD Sleiman, AP Lauf…. 2015. ieeexplore.ieee.org Cyberworlds (CW), 2015 …5 cites.
  618. Some preliminary findings on the meaning of work in Ghana: A research note“. BB Puplampu. 1997. journals.co.za IFE PsychologIA: An International Journal5 cites.
  619. Healthcare transaction validation via blockchain proof-of-work, systems and methods“. NJ Witchey. 2015. Google Patents US Patent App. 14/711,7405 cites.
  620. The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example“. C Natoli, V Gramoli. 2016. arxiv.org arXiv preprint arXiv:1612.094265 cites.
  621. 2-hop blockchain: Combining proof-of-work and proof-of-stake securely“. T Duong, L Fan, HS Zhou. 2016. eprint.iacr.org 5 cites.
  622. Proof of space from stacked expanders“. L Ren, S Devadas. 2016. Springer Theory of Cryptography Conference5 cites.
  623. Bitcoin & Gresham’s Law-the economic inevitability of Collapse“. P Güring, I Grigg. 2011. pdfs.semanticscholar.org October–December. http://iang. org …5 cites.
  624. On the danger of private blockchains“. V Gramoli. 2016. allquantor.at … Cryptocurrencies and Consensus Ledgers (DCCL’16)5 cites.
  625. Mitigation of economic distributed denial of sustainability (eddos) in cloud computing“. MN Kumar, R Korra, P Sujatha…. 2011. researchgate.net In Proc. of the Intl’Conf. on …5 cites.
  626. “A treatise on altcoins“. A Poelstra. 2014. pdfs.semanticscholar.org 5 cites.
  627. Bayesian analysis of secure P2P sharing protocols“. E Palomar, A Alcaide, JM Estevez-Tapiador…. 2007. Springer … Conferences” On the …5 cites.
  628. Bitcoin Protocol: Model of ‘Cryptographic Proof’Based Global Crypto-Currency & Electronic Payments System“. Y Malhotra. 2013. papers.ssrn.com 5 cites.
  629. SECURIST: Co-ordinating the development of a Strategic Research Agenda for Security and Dependability R&D“. JJ Clarke, WM Fitzgerald. 2005. ieeexplore.ieee.org … , 2005. CCST’05. 39th Annual 2005 …5 cites.
  630. Compensation for Work-Related Illness in Arkansas“. RB Leflar. 1988. HeinOnline Ark. L. Rev.5 cites.
  631. Latency-hiding work stealing: Scheduling interacting parallel computations with work stealing“. SK Muller, UA Acar. 2016. dl.acm.org Proceedings of the 28th ACM Symposium on …5 cites.
  632. Oblivious printing of secret messages in a multi-party setting“. A Essex, U Hengartner. 2012. Springer … Conference on Financial Cryptography and Data …5 cites.
  633. Trustworthy routing with the TORA protocol“. AA Pirzada, A Datta, C McDonald. 2004. researchgate.net Proceedings of the AusCERT …5 cites.
  634. Is Bitcoin the “Paris Hilton” of the Currency World? Or Are the Early Investors onto Something That Will Make Them Rich?“. A Chowdhury. 2016. iijournals.com The Journal of Investing5 cites.
  635. Appraisal of the Most Prominent Attacks due to vulnerabilities in cloud computing“. M Shah, AS Shah. 2016. researchgate.net International Journal of Grid and Distributed …5 cites.
  636. The Bitcoin Protocol as Law, and the Politics of a Stateless Currency“. S Jeong. 2013. papers.ssrn.com Browser Download This Paper5 cites.
  637. Employers on the Fence: A Guide to the Immigratory Workplace“. N Prescott. 2006. HeinOnline Campbell L. Rev.5 cites.
  638. On the correlation intractability of obfuscated pseudorandom functions“. R Canetti, Y Chen, L Reyzin. 2016. Springer Theory of Cryptography Conference5 cites.
  639. Lightweight protection of group content distribution“. P Szalachowski, A Perrig. 2015. dl.acm.org Proceedings of the 1st ACM Workshop on IoT …5 cites.
  640. Dak roads, dak runners, and the reordering of communication networks“. C Joshi. 2012. cambridge.org International Review of Social History5 cites.
  641. Pseudonymous broadcast and secure computation from cryptographic puzzles“. J Katz, A Miller, E Shi. 0. allquantor.at5 cites.
  642. Secure Incentive-Based Architecture for Vehicular Cloud“. K Lim, IM Abumuhfouz, D Manivannan. 2015. Springer International Conference on Ad …5 cites.
  643. Centmail: Rate limiting via certified micro-donations“. S Goel, J Hofman, J Langford, DM Pennock…. 2009. researchgate.net Proceedings of …5 cites.
  644. Confluence of the economic recession and immigration laws in the lives of Latino immigrant workers in the United States“. C Menjívar, ME Enchautegui. 2015. Springer Immigrant Vulnerability and Resilience5 cites.
  645. Protecting Tor from botnet abuse in the long term“. N Hopper. 2013. pdfs.semanticscholar.org 5 cites.
  646. Cross-country analysis of spambots“. V Garg, T Koster, LJ Camp. 2013. Springer EURASIP Journal on Information Security5 cites.
  647. Bitcoin-The Political’Virtual’of an Intangible Material Currency.“. MA Jansen. 2012. dspace.library.uu.nl 5 cites.
  648. The No-Match Letter Rule: A Mismatch between the Department of Homeland Security and Social Security Administration in Worksite Immigration Law Enforcement“. M Gibek, J Shteierman. 2007. HeinOnline Hofstra Lab. & Emp. LJ5 cites.
  649. Bypassing network flooding attacks using fastpass“. D Wendlant, DG Andersen, A Perrig. 2006. cs.cmu.edu 5 cites.
  650. Accelerating bitcoin’s transaction processing“. Y Sompolinsky, A Zohar. 2013. eprint.iacr.org Fast Money Grows on Trees, Not Chains5 cites.
  651. Ring confidential transactions“. S Noether, A Mackenzie. 2016. ledgerjournal.org Ledger5 cites.
  652. Decentralized Large-Scale Electricity Consumption Shifting by Prosumer Cooperatives.“. C Akasiadis, G Chalkiadakis. 2016. books.google.com ECAI5 cites.
  653. The influence of maternal health literacy and child’s age on participation in social welfare programs“. S Pati, E Siewert, AT Wong, SK Bhatt…. 2014. Springer Maternal and child …5 cites.
  654. Overview of e-mail SPAM elimination and its efficiency“. T Sochor. 2014. ieeexplore.ieee.org Research Challenges in Information Science (RCIS) …5 cites.
  655. Can predictive computation reach the level of anticipatory computing“. M Nadin. 2014. nadin.ws Int. J. Appl. Res. Inf. Technol. Comput5 cites.
  656. The Sleepy Model of Consensus.“. I Bentov, R Pass, E Shi. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint Archive5 cites.
  657. Higher education and graduate employment: the importance of occupational specificity in Germany and Britain“. K Leuze. 2011. books.google.com Converging worlds of welfare5 cites.
  658. A critical discourse analysis of the malaysian smart schools (mss) conceptual blueprint and implications to implementation“. L Kean-Wah, TS Ming. 2010. researchgate.net … Journal of Language Society, Society and …5 cites.
  659. The origin, classification and utility of Bitcoin“. P Šurda. 2014. papers.ssrn.com 5 cites.
  660. The use of block chain technology in different application domains“. JS Czepluch, NZ Lollike, SO Malone. 2015. lollike.org The IT University of Copenhagen …5 cites.
  661. Cryptocurrencies and bitcoin: Charting the research landscape“. M Morisse. 2015. aisel.aisnet.org 5 cites.
  662. Ring SIgnature Confidential Transactions for Monero.“. S Noether. 2015. eprint.iacr.org IACR Cryptology ePrint Archive5 cites.
  663. Bitcoin block withholding attack: Analysis and mitigation“. S Bag, S Ruj, K Sakurai. 2017. ieeexplore.ieee.org IEEE Transactions on Information …5 cites.
  664. Music on the blockchain“. M O’Dair, Z Beaven, D Neilson, R Osborne, P Pacifico. 2016. eprints.mdx.ac.uk 5 cites.
  665. Rep on the block: A next generation reputation system based on the blockchain“. R Dennis, G Owen. 2015. ieeexplore.ieee.org Internet Technology and Secured …5 cites.
  666. The Efficient Dual Receiver Cryptosystem and Its Applications.“. T Diament, HK Lee, AD Keromytis, M Yung. 2011. cs.columbia.edu IJ Network Security5 cites.
  667. Cryptocurrency value formation: an empirical analysis leading to a cost of production model for valuing bitcoin“. A Hayes. 2016. papers.ssrn.com 5 cites.
  668. A Taxonomy of Blockchain-Based Systems for Architecture Design“. X Xu, I Weber, M Staples, L Zhu, J Bosch…. 2017. ieeexplore.ieee.org … (ICSA), 2017 IEEE …5 cites.
  669. Privacy-awareness in blockchain-based PKI“. L Axon. 2015. ora.ox.ac.uk 5 cites.
  670. Medical Record System Using Blockchain, Big Data and Tokenization“. PTS Liu. 2016. Springer Information and Communications Security5 cites.
  671. Fraud detections for online businesses: a perspective from blockchain technology“. Y Cai, D Zhu. 2016. Springer Financial Innovation5 cites.
  672. Improving the efficiency of spam filtering through cache architecture“. A Khanal, BS Motlagh, T Kocak. 2007. ieeexplore.ieee.org Modeling, Analysis, and …5 cites.
  673. Workers’ Compensation for Disease in Virginia: The Exception Swallows the Rule“. EV Scott. 1985. HeinOnline U. Rich. L. Rev.5 cites.
  674. Distributed immutabilization of secure logs“. J Cucurull, J Puiggalí. 2016. Springer International Workshop on Security and Trust …5 cites.
  675. Mitigating denial of service attack using proof of work and Token Bucket Algorithm“. AK Pandey, CP Rangan. 2011. ieeexplore.ieee.org Students’ Technology Symposium …4 cites.
  676. A novel proof of work model based on pattern matching to prevent DoS attack“. A Ordi, H Mousavi, B Shanmugam, MR Abbasy…. 2011. Springer … Conference on Digital …4 cites.
  677. Mitigating denial of service attack using proof of work and token bucket algorithm“. SKJ Chen, A Somani. 2011. Proceedings of the 2006 workshop on Dependability …4 cites.
  678. “the proof-of-work chain is a solution to the byzantine generals’ problem“. S Nakamoto. 2008. The Cryptography Mailing List, https://www. mailarchive …4 cites.
  679. Momentum–a memory-hard proof-of-work via finding birthday collisions, 2014“. D Lorimer. 2014. . 4 cites.
  680. Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies“. M Borge, E Kokoris-Kogias, P Jovanovic…. 2017. ieeexplore.ieee.org Security and Privacy …4 cites.
  681. Egalitarian computing“. ABD Khovratovich. 2015. usenix.org 4 cites.
  682. TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake.“. A Chepurnoy, T Duong, L Fan, HS Zhou. 2017. eprint.iacr.org IACR Cryptology ePrint …4 cites.
  683. Proofs of communication and its application for fighting spam“. M Klonowski, T Strumiński. 2008. Springer SOFSEM 2008: Theory and Practice of …4 cites.
  684. Proofs of Proofs of Work with Sublinear Complexity“. A Kiayias, N Lamprou, AP Stouka. 2016. Springer International Conference on Financial …4 cites.
  685. Model-based Security Engineering of SOA Systems Using Modified” UML-SOA-Sec”“. MQ Saleem, JB Jaafar…. 2012. The International Association for … Advances in …4 cites.
  686. International certification study: UK and Ireland“. J Stejskal. 2002. cetra.com The ATA Chronicle, May4 cites.
  687. Proof of Space from Stacked Bipartite Graphs.“. L Ren, S Devadas. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint Archive4 cites.
  688. Cooperation in decentralised networks“. M Rogers, S Bhatti. 2005. pdfs.semanticscholar.org London Communications Symposium …4 cites.
  689. Combating spam and denial-of-service attacks with trusted puzzle solvers“. P Tsang, S Smith. 2008. Springer Information Security Practice and Experience4 cites.
  690. Technical basis of digital currencies“. S Sprankel. 2013. coderblog.de 4 cites.
  691. A new proof-of-work mechanism for bitcoin“. N Shi. 2016. jfin-swufe.springeropen.com Financial Innovation4 cites.
  692. Formal verification of smart contracts“. K Bhargavan, A Delignat-Lavaud…. 2016. antoine.delignat-lavaud.fr Proceedings of the …4 cites.
  693. Asian immigrant women fight domestic violence“. DL Jang. 1998. … lives: multicultural perspectives. Mountain View, CA …4 cites.
  694. The bitcoin transaction graph—anonymity“. MS Ortega. 2013. cv.uoc.edu Master’ s thesis, Universitat Oberta de Catalunya4 cites.
  695. DEVELOPMENTS IN BANKING AND FINANCIAL LAW: 2013: XI. Bitcoin: The Legal Implications of a Novel Currency“. J Burleson. 2013. litigation-essentials.lexisnexis.com Rev. Banking & Fin. L.4 cites.
  696. Concerning charting“. M Busche. 1928. JSTOR The American Journal of Nursing4 cites.
  697. Reputation scoring system using an economic trust model: a distributed approach to evaluate trusted third parties on the internet“. M Vyshegorodtsev, D Miyamoto…. 2013. ieeexplore.ieee.org … (WAINA), 2013 27th …4 cites.
  698. Time-release Protocol from Bitcoin and Witness Encryption for SAT.“. J Liu, F Garcia, M Ryan. 2015. pdfs.semanticscholar.org IACR Cryptology ePrint Archive4 cites.
  699. The effects of anti-spam methods on spam mail“. E Reshef, E Solan. 2006. pdfs.semanticscholar.org 3rd Conference on Email and Anti …4 cites.
  700. A Framework for the Model Driven Development of Secure Web Services Composition“. MQ Saleem, JB Jaafar…. 2012. pdfs.semanticscholar.org International Journal of …4 cites.
  701. Smart Contracts–Blockchains in the Wings“. T Bocek, B Stiller. 2018. Springer Digital Marketplaces Unleashed4 cites.
  702. Distributed Denial of Service-Defense Attack Tradeoff Analysis (DDOS-DATA)“. WJ Blackert, RL Hom, AK Castner, RM Jokerst…. 2004. dtic.mil 4 cites.
  703. The new architecture of P2P-botnet“. D Sun, X Li, W Liu, J Wu. 2010. ieeexplore.ieee.org Cybercrime and Trustworthy …4 cites.
  704. Colored coins: Bitcoin, blockchain, and land administration“. A Anand, M McKibbin, F Pichel. 2016. ubitquity.io … World Bank Conference on Land and …4 cites.
  705. Issues in designing a Bitcoin-like community currency“. D Vandervort, D Gaucas, R St Jacques. 2015. Springer International Conference on …4 cites.
  706. CheR: Cheating resilience in the cloud via smart resource allocation“. F Lombardi, F Martinelli, D Sgandurra. 2014. Springer Foundations and Practice of …4 cites.
  707. Proofs of Useful Work.“. M Ball, A Rosen, M Sabin…. 2017. eprint.iacr.org IACR Cryptology ePrint …4 cites.
  708. Multiple-use transferable e-cash“. P Sarkar. 2013. search.proquest.com International journal of computer applications4 cites.
  709. Applicability of distributed ledger technology to capital market infrastructure“. A Santo, I Minowa, G Hosaka, S Hayakawa…. 2016. finextra.com … Exchange Group, JPX …4 cites.
  710. Toward de-anonymizing bitcoin by mapping users location“. J Dupont, AC Squicciarini. 2015. dl.acm.org Proceedings of the 5th ACM Conference on …4 cites.
  711. Authenticated key exchange over bitcoin“. P McCorry, SF Shahandashti, D Clarke…. 2015. Springer … Conference on Research …4 cites.
  712. The economics of distributed ledger technology for securities settlement“. E Benos, R Garratt, P Gurrola-Perez. 2017. papers.ssrn.com 4 cites.
  713. Spam detection in social bookmarking websites“. M Poorgholami, M Jalali, S Rahati…. 2013. ieeexplore.ieee.org … and Service Science …4 cites.
  714. incentive-Centered design for security“. JK MacKie-Mason. 2009. ieeexplore.ieee.org IEEE Security & Privacy4 cites.
  715. Workplace Searches by Public Employers and the Fourth Amendment“. PR Koster. 2007. JSTOR The Urban Lawyer4 cites.
  716. Workers’ Compensation and Occupational Disease“. DB LaPlante, R Opp. 1982. HeinOnline Mont. L. Rev.4 cites.
  717. State of Housing Microfinance in Africa“. M Kihato. 2013. housingfinanceafrica.org Centre for Affordable Housing Finance in Africa4 cites.
  718. A novel wlan client puzzle against dos attack based on pattern matching“. A Ordi, M Zamani, N Bashah Idris…. 2015. hindawi.com Mathematical …4 cites.
  719. Location verification on the internet: Towards enforcing location-aware access policies over internet clients“. ARM Abdou, A Matrawy…. 2014. ieeexplore.ieee.org … and Network Security …4 cites.
  720. ZeroBlock: Preventing Selfish Mining in Bitcoin.“. S Solat, M Potop-Butucaru. 2016. pdfs.semanticscholar.org arXiv preprint arXiv …4 cites.
  721. Trail Building During Complex Search Tasks.“. S Franken, U Norbisrath. 2014. books.google.com Mensch & Computer4 cites.
  722. Extractable witness encryption and timed-release encryption from bitcoin“. J Liu, SA Kakvi, B Warinschi. 2015. pdfs.semanticscholar.org 4 cites.
  723. Public Verification of Private Effort.“. G Alberini, T Moran, A Rosen. 2015. books.google.com TCC (2)4 cites.
  724. Bitcoin: Free Money Or Fraud?“. K Schurman. 2011. books.google.com 4 cites.
  725. Digital Currencies and Distributed Ledgers“. V Morabito. 2016. Springer The Future of Digital Business Innovation4 cites.
  726. An Endorsement-based Mobile Payment System for a Disaster Area“. B Ojetunde, N Shibata, J Gao…. 2015. ieeexplore.ieee.org … Information Networking and …4 cites.
  727. Bringing secure Bitcoin transactions to your smartphone“. D Frey, MX Makkes, PL Roman, F Taïani…. 2016. dl.acm.org Proceedings of the 15th …4 cites.
  728. Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World.“. M Chase, R Ostrovsky, I Visconti. 2015. microsoft.com EUROCRYPT (2)4 cites.
  729. Automation and disruption in stolen payment card markets“. T Peacock, A Friedman. 2010. weis2014.econinfosec.org Criminal Justice Studies4 cites.
  730. Economic denial of sustainability mitigation in cloud computing“. M Ficco, M Rak. 2016. Springer Organizational Innovation and Change4 cites.
  731. Bitcoin risk analysis“. M Kiran, M Stanett. 2015. nemode.ac.uk NEMODE Policy Paper4 cites.
  732. High-performance capabilities for 1-hop containment of network attacks“. T Wolf, S Natarajan, KT Vasudevan. 2013. dl.acm.org IEEE/ACM Transactions on …4 cites.
  733. SOK: Making sense of censorship resistance systems“. S Khattak, T Elahi, L Simon, CM Swanson…. 2016. degruyter.com … on Privacy Enhancing …4 cites.
  734. Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks“. ZA Baig, SM Sait, F Binbeshr. 2016. Elsevier Computer Networks4 cites.
  735. A Secure, Efficient, and Transparent Network Architecture for Bitcoin“. AP Ozisik, G Andresen, GD Bissias, A Houmansadr…. 2016. pdfs.semanticscholar.org 4 cites.
  736. Smart Contracts Make Bitcoin Mining Pools Vulnerable.“. Y Velner, J Teutsch, L Luu. 2017. people.cs.uchicago.edu IACR Cryptology ePrint Archive4 cites.
  737. Fair overload handling using proof-of-work functions“. S Golze, G Muhl. 2006. ieeexplore.ieee.org Applications and the Internet, 2006. SAINT …3 cites.
  738. ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.“. S Biedermann, NP Karvelas, S Katzenbeisser, T Strufe…. 2014. Springer SOFSEM3 cites.
  739. Proof-of-Work” proves not to work; version 0.2, Sept. 2004“. B Laurie, R Clayton. 0. . 3 cites.
  740. Antispam Systems Using Proof of Work Postage Stamps and Digital Signatures“. E Johanssen. 2001. Sep 3 cites.
  741. Cryptocurrencies without Proof of Work (2014)“. I Bentov, A Gabizon, A Mizrahi. 2014. arXiv preprint arXiv:1406.56943 cites.
  742. Bitcoin“. S Nakamoto. 2008. eecs.umich.edu A Peer-to-Peer Electronic Cash System3 cites.
  743. A System for Distributed Minting and Management of Persistent Identifiers“. Ł Bolikowski, A Nowiński, W Sylwestrzak. 2015. ijdc.net International Journal of Digital …3 cites.
  744. An efficient distributed currency“. B Laurie. 2011. links.org Practice3 cites.
  745. Bitcoin cooperative proof-of-stake“. SL Reed. 2014. arxiv.org arXiv preprint arXiv:1405.57413 cites.
  746. CSCL theories“. H Lin, R Pass. 1996. Citeseer 3 cites.
  747. DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.“. E Wustrow, B VanderSloot. 2016. usenix.org WOOT3 cites.
  748. Solutions“. KHTSO Solid. 1987. img1.wsimg.com Chemistry Letters3 cites.
  749. Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011 …“. H Cherifi, JM Zain, E El-Qawasmeh. 2011. books.google.com 3 cites.
  750. Establishment of a trusted relationship between unknown communication parties“. L Tarkkala, N Asokan. 2012. Google Patents US Patent 8,132,0053 cites.
  751. The Bitcoin transaction system“. LA de la Porte. 2012. cs.uu.nl Utrecht, Netherlands3 cites.
  752. The Alaska Workers’ Compensation Law: Fact-Finding, Appellate Review, and the Presumption of Compensability“. A Larson, J Lewis. 1985. HeinOnline Alaska L. Rev.3 cites.
  753. NREGA: Challenges in implementation“. T Sood. 2006. InfoChange Features. http://www. infochangeindia. org …3 cites.
  754. Marker addresses: Adding identification information to Bitcoin transactions to leverage existing trust relationships.“. J Vornberger. 2012. cs.emis.de GI-Jahrestagung3 cites.
  755. A Comparison of Trust Models.“. M Sel. 2015. Springer ISSE3 cites.
  756. Examining the DoS resistance of HIP“. S Tritilanunt, C Boyd, E Foo, JMG Nieto. 2006. Springer OTM Confederated International …3 cites.
  757. An architectural assessment of bitcoin: using the systems modeling language“. N Roth. 2015. Elsevier Procedia Computer Science3 cites.
  758. Inexpensive Email Addresses An Email Spam-Combating System.“. A Yegenian, T Dimitriou. 2010. Springer SecureComm3 cites.
  759. Judicial Review of Workmen’s Compensation Cases“. JT Haferman. 1975. HeinOnline Workmen’s Comp. L. Rev.3 cites.
  760. Model-based security engineering of SOA system using security intent DSL“. MQ Saleem, J Jaafar, MF Hassan. 2011. sdiwc.net International Journal of New Computer …3 cites.
  761. Regularisation programmes in Greece“. A Levinson. 2005. mighealth.net 3 cites.
  762. Fawkescoin“. J Bonneau, A Miller. 2014. Springer Cambridge International Workshop on Security …3 cites.
  763. Money burning and implementation“. J Hartline, T Roughgarden. 2007. researchgate.net 3 cites.
  764. Making bitcoin exchanges transparent“. C Decker, J Guthrie, J Seidel, R Wattenhofer. 2015. Springer European Symposium on …3 cites.
  765. Re-traffic pricing for fighting against DDoS“. YY Shen, FQ Fan, WX Xie, LF Mo. 2008. ieeexplore.ieee.org … , Control, and Management …3 cites.
  766. Future of Bitcoin & Statistical Probabilistic Quantitative Methods: Global Financial Regulation (Interview: Hong Kong Institute of CPAs)“. Y Malhotra. 2014. finrm.org Regulatory Compliance Report. 2014d. Global Risk …3 cites.
  767. New approach to mitigating distributed service flooding attacks“. M Abliz, T Znati. 2012. people.cs.pitt.edu … of IARIA 7th International Conference on …3 cites.
  768. On the use of key assignment schemes in authentication protocols“. J Alderman, J Crampton. 2013. Springer … Conference on Network and System Security3 cites.
  769. Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions“. X Boyen, C Carr, T Haines. 2016. eprint.iacr.org 3 cites.
  770. Covert Communication in VANETS using Internet Protocol Header Bit“. K Manchanda, A Singh. 2015. search.proquest.com International Journal of Computer …3 cites.
  771. Bitcoin protocol specification“. K Okupski. 0. pdfs.semanticscholar.org3 cites.
  772. Tort Immunity Revisited: What Is the Present Test for Statutory Employer“. JM Church. 1993. HeinOnline La. L. Rev.3 cites.
  773. Progress Reports Improve Students’ Course Completion Rate and Achievement in Math Computer-Assisted Instruction.“. RB Clariana, LJ Smith. 1989. ERIC 3 cites.
  774. Crypto currencies: core information technology and information system fundamentals enabling currency without borders“. A Serapiglia, CP Serapiglia, J McIntyre. 2015. isedj.org Information Systems Education …3 cites.
  775. Enclaves of Rights: Workplace Enforcement, Union Contracts, and the Uneven Regulatory Geography of Immigration Policy“. V Parks. 2014. Taylor & Francis Annals of the Association of American Geographers3 cites.
  776. Enhancement of Preventing Application Layer Based on DDOS Attacks by Using Hidden Semi-Markov Model“. KK Oo, KZ Ye, H Tun, KZ Lin, EM Portnov. 2016. Springer Genetic and Evolutionary …3 cites.
  777. Bitcoins: Made in China“. T Swanson. 2014. ofnumbers.com Bitcoin Magazine3 cites.
  778. Blockchains Consensus Protocols in the Wild“. C Cachin, M Vukolić. 2017. arxiv.org arXiv preprint arXiv:1707.018733 cites.
  779. Reinforcing Immutability of Permissioned Blockchains with Keyless Signatures’ Infrastructure“. N Emmadi, H Narumanchi. 2017. dl.acm.org … of the 18th International Conference on …3 cites.
  780. Legitimizing Bitcoin: Policy Recommendations“. T Alcorn, A Eagle, E Sherbondy. 2014. groups.csail.mit.edu 3 cites.
  781. Personalized PageRank solution paths“. K Kloster, DF Gleich. 2015. math.purdue.edu arXiv preprint arXiv:1503.003223 cites.
  782. Cryptographic approaches to denial-of-service resistance“. C Boyd, J Gonzalez-Nieto, L Kuppusamy…. 2011. Springer An Investigation into the …3 cites.
  783. Systems-compatible incentives“. D Levin, N Spring…. 2009. ieeexplore.ieee.org Game Theory for Networks …3 cites.
  784. Chain interoperability“. V Buterin. 2016. r3cev.com 3 cites.
  785. Training of pathologists in countries belonging to the European Economic Community.“. MG Rinsler. 1977. ncbi.nlm.nih.gov Journal of clinical pathology3 cites.
  786. Bitcoin and decentralized trust protocols“. R Pérez-Marco. 2016. arxiv.org arXiv preprint arXiv:1601.052543 cites.
  787. The EARWORM Password Hashing Algorithm“. D Franke. 2014. password-hashing.net 3 cites.
  788. Banking on Bitcoin: Applying Anti-Money Laundering and Money Transmitter Laws“. KL Penrose. 2013. HeinOnline NC Banking Inst.3 cites.
  789. NeTS—FIND: Enabling Defense and Deterrence through Private Attribution“. AC Snoeren, Y Kohno, S Savage…. 2007. researchgate.net FIND-Funded pro  …3 cites.
  790. 4. OATH OF HYPOCRITES: FAKE MEDICAL COLLEGES“. AK Menon, MG Radhakrishnan, S David…. 2005. medind.nic.in Australian Health …3 cites.
  791. Digital Banking Manifesto: The End of Banks?“. A Lipton, D Shrier, A Pentland. 2016. getsmarter.com 3 cites.
  792. Detecting fraudulent activity in a cloud using privacy-friendly data aggregates“. M Solanas, J Hernandez-Castro, D Dutta. 2014. arxiv.org arXiv preprint arXiv:1411.67213 cites.
  793. Double spend races“. C Grunspan, R Pérez-Marco. 2017. arxiv.org arXiv preprint arXiv:1702.028673 cites.
  794. Modeling and verification of the bitcoin protocol“. K Chaudhary, A Fehnker, J Van De Pol…. 2015. arxiv.org arXiv preprint arXiv …3 cites.
  795. Supporting the evaluation of complex search tasks with the SearchTrails tool“. S Franken, U Norbisrath. 2014. dl.acm.org … of 24th Annual International Conference on …3 cites.
  796. Blockchains and the Logic of Accountability: Keynote Address“. M Herlihy, M Moir. 2016. dl.acm.org Proceedings of the 31st Annual ACM/IEEE …3 cites.
  797. Query-Complexity Amplification for Random Oracles.“. G Demay, P Gazi, U Maurer, B Tackmann. 2015. Springer ICITS3 cites.
  798. Controllable growth and electrostatic properties of Bernal stacked bilayer MoS2“. S Hao, B Yang, Y Gao. 2016. aip.scitation.org Journal of Applied Physics3 cites.
  799. Tezos: A Self-Amending Crypto-Ledger Position Paper“. LM Goodman. 2014. tezos.com 3 cites.
  800. What’s So Different about Blockchain?—Blockchain is a Probabilistic State Machine“. K Saito, H Yamada. 2016. ieeexplore.ieee.org Distributed Computing Systems …3 cites.
  801. Security implications of blockchain cloud with analysis of block withholding attack“. DK Tosh, S Shetty, X Liang, CA Kamhoua…. 2017. dl.acm.org Proceedings of the 17th …3 cites.
  802. Applications of smart-contracts and smart-property utilizing blockchains“. E Hillbom, T Tillström. 2016. publications.lib.chalmers.se 3 cites.
  803. A first econometric analysis of the CRIX family“. S Chen, CYH Chen, WK Härdle, TM Lee, B Ong. 2016. papers.ssrn.com 3 cites.
  804. Towards scalable and private industrial blockchains“. W Li, A Sforzin, S Fedorov, GO Karame. 2017. dl.acm.org Proceedings of the ACM …3 cites.
  805. Scalable Byzantine Consensus via Hardware-assisted Secret Sharing“. J Liu, W Li, GO Karame, N Asokan. 2016. arxiv.org arXiv preprint arXiv:1612.049973 cites.
  806. Криптовалюта: особенности создания и внедрения“. МВ Вотинов, ИВ Мартьянова…. 2015. colloquium-publishing.ru НОВЫЙ …3 cites.
  807. Abstract and overview proof of work can work“. D Liu, LJ Camp. 2006. Citeseer 2 cites.
  808. Momentum-a memory-hard proof-of-work via finding birthday collisions“. D Larimer. 0. hashcash.org2 cites.
  809. How to Configure Proof-of-Work Functions to Stop Spam.“. S Golze, G Mühl, T Weis, K Betriebssysteme. 2005. pdfs.semanticscholar.org Sicherheit2 cites.
  810. Alternatives for Proof of Work, Part 2: Proof of Activity, Proof of Burn, Proof of Capacity, and Byzantine Generals“. R Paterrson. 2015. Abgerufen am 2 cites.
  811. Bitcoin: Proof of Work“. Z Ramzan. 2013. … /bitcoin/v/bitcoin-proof-of-work 2 cites.
  812. Long-range attacks: The serious problem with adaptive proof of work“. V Buterin. 2014. … problem-with-adaptive-proof-of-work … 2 cites.
  813. Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake, 2014“. I Bentov, C Lee, A Mizrahi, M Rosenfeld. 2014. Preprint2 cites.
  814. When proof of work works“. D Liu, LJ Camp. 2006. papers.ssrn.com 2 cites.
  815. A proof of work stealing for dedicated multiprocessors“. UA Acar, SK Muller. 2016. Technical Report CMU-CS-16-114 … 2 cites.
  816. The sum of all chains—let’s converge!, 2015. Presentation for Coinscrum and Proof of Work“. I Grigg. 0. . 2 cites.
  817. SPECTRE: Serialization of Proof-of-work Events: Confirming Transactions via Recursive Elections“. Y Sompolinsky, Y Lewenberg, A Zohar. 2016. . 2 cites.
  818. De Fuentes, Almudena Alcaide,” Hindering false event dissemination with VANETS with proof-of-work mechanisms”, Department of Computer Science“. E Palomar, M Jose. 2014. Elsevier 2 cites.
  819. Gridcoin: Crypto-currency using berkeley open infrastructure network computing grid as a proof of work“. R Halford. 2014. . 2 cites.
  820. Hashcash Proof-of-Work System“. A Black. 1997. . 2 cites.
  821. Designing proof of human-work puzzles for cryptocurrency and beyond“. J Blocki, HS Zhou. 2016. Springer Theory of Cryptography Conference2 cites.
  822. Security Concerns and Issues for Bitcoin“. CA Vyas, M Lunagaria. 2014. Citeseer the proceedings of National Conference cum …2 cites.
  823. Best jobs for ex-offenders“. RL Krannich. 2016. dl.pgu.ac.ir 2 cites.
  824. Systems and methods for authenticating requests from a client running trialware through a proof of work protocol“. Z Ramzan, W Bogorad, V Seshadri, V Antonov…. 2013. Google Patents US Patent …2 cites.
  825. Proofs of work for blockchain protocols“. JA Garay, A Kiayias, G Panagiotakos. 2017. pdfs.semanticscholar.org 2 cites.
  826. Hashimoto: I/O bound proof of work. 2014“. T Dryja. 0. URL {https://mirrorx. com/files/hashimoto. pdf}2 cites.
  827. A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database“. L Aniello, R Baldoni, E Gaetani, F Lombardi…. 2017. eprints.soton.ac.uk 2 cites.
  828. Accountability in P2P Democracy“. M Kelaskar. 0. World of Practical Peers, Powerpoint presentation …2 cites.
  829. On decentralizing prediction markets and order books“. J Bonneau, EW Felten, J Clark, A Miller, JA Kroll…. 2014. . 2 cites.
  830. Review of CryptoNote white paper“. S Noether. 2014. bravenewcoin.com … http://monero. cc/downloads/whitepaper_review. pdf …2 cites.
  831. Bitcoin: An Empirical Study of Cryptocurrency“. E Rosen, E Wengrowski, GD Clark, X Gao. 2014. ericwengrowski.com 2 cites.
  832. Reputation Sensitive Message Passing in Content Addressable Networks“. E Buchmann, K Böhm…. 2003. Univ., Fak. für Informatik 2 cites.
  833. Connecting the Blockchain to the Sun to Save the Planet“. LP Johnson, A Isam, N Gogerty, J Zitoli. 2015. papers.ssrn.com 2 cites.
  834. System and methods of determining computational puzzle difficulty for challenge-response authentication“. WC Feng, E Kaiser. 2011. Google Patents US Patent App. 13/050,1232 cites.
  835. Moving to the UK as a GP: The process explained“. R Hays. 2007. search.proquest.com Australian family physician2 cites.
  836. System for providing trusted user access of computer systems“. S Marinov, K Miller. 2014. Google Patents US Patent 8,793,7782 cites.
  837. Computers and Internet: Are All Modern Currencies Not Virtual?–The Bitcoin Phenomenon“. D Flint. 2014. kluwerlawonline.com Business Law Review2 cites.
  838. Application of Machine Learning Algorithms for Bitcoin Automated Trading“. K Żbikowski. 2016. Springer Machine Intelligence and Big Data in Industry2 cites.
  839. An overview of blockchain technology: Architecture, consensus, and future trends“. Z Zheng, S Xie, H Dai, X Chen…. 2017. ieeexplore.ieee.org Big Data (BigData …2 cites.
  840. The Dual Nature of Bitcoin as Payment Network and Money“. P Tasca. 2016. papers.ssrn.com Browser Download This Paper2 cites.
  841. A study of electronic cash paradigm“. DE Saputra, SH Supangkat. 2014. ieeexplore.ieee.org Information Technology Systems …2 cites.
  842. Blockchain Technologies: The Foreseeable Impact on Society and Industry“. T Aste, P Tasca, T Di Matteo. 2017. ieeexplore.ieee.org Computer2 cites.
  843. Accountable security mechanism based on security service level agreement“. T Takahashi, J Kannisto, J Harju…. 2013. ieeexplore.ieee.org … (ISCC), 2013 IEEE …2 cites.
  844. Electronic Contract Signing Without Using Trusted Third Party“. Z Wan, RH Deng, D Lee. 2015. Springer … Conference on Network and System Security2 cites.
  845. The Determination of a Secondary Wage“. RJ O’Dea. 1968. journals.sagepub.com Journal of Industrial Relations2 cites.
  846. Sex Worker Rights Organizing as Social Movement Unionism: Responding to the Criminalization of Work“. CA Jackson. 2013. digitalscholarship.unlv.edu 2 cites.
  847. Bitcoin“. M Betancourt. 2013. mmduvic.ca CTheory2 cites.
  848. Indistinguishable proofs of work or knowledge“. F Baldimtsi, A Kiayias, T Zacharias, B Zhang. 2016. Springer Advances in Cryptology …2 cites.
  849. Latency-hiding work stealing“. SK Muller, UA Acar. 2015. reports-archive.adm.cs.cmu.edu Proceedings of the twenty …2 cites.
  850. What’s new in computers“. PCP Bhatt. 2014. Springer Resonance2 cites.
  851. Blockchain Technology as s Support Infrastructure in e-Government“. S Ølnes, A Jansen. 2017. Springer International Conference on Electronic Government2 cites.
  852. Beyond Bitcoin-Part II: Blockchain-based systems without mining.“. P Forte, D Romano, G Schmid. 2016. eprint.iacr.org IACR Cryptology ePrint Archive2 cites.
  853. Legal Needs and Barriers: The Case for Supporting Representation of Aliens“. R Irwin. 1993. HeinOnline Clearinghouse Rev.2 cites.
  854. Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network“. J Hirshman, Y Huang, S Macke. 2013. pdfs.semanticscholar.org 2 cites.
  855. The Compensability of Chronic Stress: A Policy Dilemma for the Ontario Workers’ Compensation Board“. SED Shortt. 1995. JSTOR Canadian Public Policy/Analyse de Politiques2 cites.
  856. Formalising the Bitcoin protocol“. WJB Beukema. 2014. referaat.cs.utwente.nl Availabl e at http://referaat. cs. utwente. nl …2 cites.
  857. Does the Velocity of Bitcoins Effect the Price Level of Bitcoin“. MJ DeLeo, W Stull. 2014. academia.edu Temple University2 cites.
  858. Secure peer-to-peer trading for multiplayer games“. C GauthierDickey, C Ritzdorf. 2012. ieeexplore.ieee.org Network and Systems Support …2 cites.
  859. Comments to the New York department of financial services on the proposed virtual currency regulatory framework“. J Brito, E Dourado. 2014. mercatus.org Public Interest Comment, Mercatus Center …2 cites.
  860. Real world privacy expectations in VANETs real world privacy expectations in VANETs“. M Feiri, J Petit, F Kargl. 2014. doc.utwente.nl 2 cites.
  861. Bitcoin–The Miner’s Dilemma“. I Eyal. 2015. papers.ssrn.com 2 cites.
  862. Fair anonymity for the Tor network“. J Diaz, D Arroyo, FB Rodriguez. 2014. arxiv.org arXiv preprint arXiv:1412.47072 cites.
  863. WHAT IS BITCOIN?“. RA Glantz. 2014. panteracapital.com 2 cites.
  864. On the Phase Space of Block-Hiding Strategies.“. A Shomer. 2014. eprint.iacr.org IACR Cryptology ePrint Archive2 cites.
  865. Literature survey of performance benchmarking approaches of BPEL engines“. C Röck, S Harrer. 2014. opus4.kobv.de 2 cites.
  866. Leveraging bitcoin blockchain technology to modernize security perfection under the uniform commercial code“. DS Gerstl. 2016. Springer International Conference of Software Business2 cites.
  867. Consulates and Polonia Social Organizations“. B Heydenkorn. 1985. Canadian Polish Research Institute A Community in Transition: the …2 cites.
  868. The Balance Attack or Why Forkable Blockchains Are Ill-Suited for Consortium“. C Natoli, V Gramoli. 2017. ieeexplore.ieee.org … Systems and Networks (DSN), 2017 47th …2 cites.
  869. Optimized Execution of Business Processes on Blockchain“. L García-Bañuelos, A Ponomarev, M Dumas…. 2017. Springer … Conference on Business …2 cites.
  870. Forthcoming“. YY Hsieh, JP Vergne, S Wang. 0. researchgate.net Public interest (t-1)2 cites.
  871. Algorand“. J Chen, S Micali. 2016. adsabs.harvard.edu arXiv preprint arXiv:1607.013412 cites.
  872. Economics of Competing Crypto Currencies: Monetary Policy, Miner Reward and Historical Evolution“. Y Zhang, G Song. 2014. nicolascourtois.com 2 cites.
  873. Blockchains and electronic health records“. B Yuan, W Lin, C McDonnell. 2016. mcdonnell.mit.edu Mcdonnell. mit. edu2 cites.
  874. D4. 4-Design of Social Digital Currency“. D Roio, M Sachy, S Lucarelli, B Lietaer, F Bria. 2015. aisberg.unibg.it 2 cites.
  875. Addressing spam e-mail using hashcast“. K Curran, JS Honan. 2005. igi-global.com … Journal of Business Data Communications and …2 cites.
  876. Critical Review of Economical Denial of Sustainability (EDoS) Mitigation Techniques“. PS Bawa, S Manickam. 2015. researchgate.net Journal of Computer Science2 cites.
  877. How a finely tuned system of checks and balances has been effectively dismantled“. D Cadman. 2014. cis.org Center for Immigration Studies2 cites.
  878. Factom ledger by consensus“. P Snow, B Deery, P Kirby, D Johnston. 2015. bravenewcoin.com 2 cites.
  879. Digitalizing the Malaysian classroom: Barriers, insights and feasibility“. LS Yin. 2013. Jurnal Pengajian Media Malaysia2 cites.
  880. Getting Off the Ground: The Case of Bitcoin“. WJ Luther. 2017. papers.ssrn.com 2 cites.
  881. Practical Aspects of the Bitcoin System“. AKGC Sorge. 2013. arxiv.org arXiv preprint arXiv:1308.67602 cites.
  882. A simple yet efficient approach to combat transaction malleability in bitcoin“. U Rajput, F Abbas, R Hussain, H Eun, H Oh. 2014. Springer International Workshop on …2 cites.
  883. Building Character: How to Grant Actors Limited Copyright Protection for Performances without Creating a New Special of Copyrighted Work“. M Kawabata. 2014. HeinOnline Tex. Rev. Ent. & Sports L.2 cites.
  884. Discovering the social organization of school library work“. J Crispin. 2009. mospace.umsystem.edu 2 cites.
  885. Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments“. J Schneider, N Fleischhacker, D Schröder…. 2016. dl.acm.org Proceedings of the 2016 …2 cites.
  886. Monitoring wildlife conservation using networked RFID for secure positioning“. F Yang, F Zhang, J Wang, DS Hailu. 2012. Springer Communications and Information …2 cites.
  887. Being dissimilar: Religious dissimilarity, gender dissimilarity, value dissimilarity and job satisfaction“. I Ullah, M Usman, AS Niazi, M Farooq…. 2012. researchgate.net … and Business Review2 cites.
  888. Privacy in overlay-based smart traffic systems“. M Florian, I Baumgart. 2013. ieeexplore.ieee.org Local Computer Networks Workshops …2 cites.
  889. Distributed Bitcoin Account Management“. X Zhou, Q Wu, B Qin, X Huang…. 2016. ieeexplore.ieee.org Trustcom/BigDataSE/I​ …2 cites.
  890. Business processes secured by immutable audit trails on the blockchain“. P Snow, B Deery, J Lu, D Johnston, P Kirby…. 2014. bcventures.net 2 cites.
  891. ‘As relevant as banning polo in Greenland’: the absence of ethnographic insight into country sports in the UK“. S Hillyard. 2007. journals.sagepub.com Qualitative Research2 cites.
  892. A case study on education networks and brokerage“. G Martin, O Bohl, AW Scheer…. 2007. igi-global.com Cases on Global E …2 cites.
  893. MI: Cross-layer malleable identity“. SH Khor, A Nakao. 2011. ieeexplore.ieee.org Communications (ICC), 2011 IEEE …2 cites.
  894. Labor Politics and Organizing Strategies in Immigrant‐Owned SMEs: The Case of the Confédération Générale du Travail and Chinese Migrant Workers in France“. YH Chuang. 2014. Wiley Online Library WorkingUSA2 cites.
  895. Future of Payment Platforms“. SB Youssefzadeh. 2014. digitalcommons.calpoly.edu 2 cites.
  896. Virtual currencies and distributed ledger technology: What is new under the sun and what is hyped repackaging?“. H Leinonen. 2016. ingentaconnect.com Journal of Payments Strategy & Systems2 cites.
  897. The Economics of the Blockchain: A study of its engineering and transaction services marketplace“. D Bargar. 2016. search.proquest.com 2 cites.
  898. Bitcoin: The Trade of Digital Signatures“. S Hazratjee. 2015. HeinOnline T. Marshall L. Rev.2 cites.
  899. Notes on Scalable Blockchain Protocols (verson 0.3)“. V Buterin, J Coleman, M Wampler-Doty. 2015. pdfs.semanticscholar.org 2 cites.
  900. 4P: Performant private peer-to-peer file sharing“. N Zeilemaker, J Pouwelse…. 2014. ieeexplore.ieee.org Peer-to-Peer Computing …2 cites.
  901. Kudos: A Peer-to-Peer Discussion System Based on Social Voting“. L Matteis. 0. the-blockchain.com2 cites.
  902. Bitcoin: Main Trends and Perspectives“. NE Egorova, KA Torzhevsky. 2016. journalrepository.org British Journal of Economics …2 cites.
  903. Bitcoin: Main Trends and Perspectives“. NE Egorova, KA Torzhevsky. 2016. journalrepository.org British Journal of Economics …2 cites.
  904. Adding Up the Bits and Pieces: How Big An Effect Will Bitcoin and Crypto Currency Exert on Remote and Interactive Gambling?“. M Owens, AA Lavitch. 2013. online.liebertpub.com Gaming Law Review and Economics2 cites.
  905. Towards a framework for the evaluation and design of distributed ledger technologies in banking and payments“. J Bott, U Milkau. 2016. ingentaconnect.com Journal of Payments Strategy & Systems2 cites.
  906. A probabilistic analysis of the nxt forging algorithm“. S Popov. 2016. ledgerjournal.org Ledger2 cites.
  907. Advancing Egalitarianism“. G Wood, A Buchanan. 2015. books.google.com … of Digital Currency. Academic Press, San …2 cites.
  908. On Bitcoin Security in the Presence of Broken Cryptographic Primitives“. I Giechaskiel, C Cremers, KB Rasmussen. 2016. Springer European Symposium on …2 cites.
  909. Unclassified worked flints“. H Stopes. 1900. JSTOR Journal of the Anthropological Institute of Great Britain …2 cites.
  910. Deterrence to Hiring Illegal Immigrant Workers: Will the New Employer Sanction Provisions Work“. SE Steele. 2007. HeinOnline Ga. J. Int’l & Comp. L.2 cites.
  911. Work stress in the banking industries of Australia and South Africa: Drivers of stress and legislative responses to the issue“. A Bunn, R Guthrie, N Smit. 2013. search.informit.com.au International Journal of …2 cites.
  912. Analýza virtuální měny Bitcoin“. P HUŘŤÁK. 2013. theses.cz 2 cites.
  913. Блокчейн как коммуникационная основа формирования цифровой экономики: преимущества и проблемы“. ММ Пряников, АВ Чугунов. 2017. cyberleninka.ru International Journal of Open …2 cites.
  914. Heritage documentation for conservation: partnership in learning“. M Santana Quintero, B Blake, R Eppich…. 2008. lirias.kuleuven.be The Spirit of …2 cites.
  915. Bitcoin pour remplacer les devises?“. FR Velde. 2015. cairn.info Revue d’économie financière2 cites.
  916. Правовой Режим валюты нового поколения“. ЕЮ Моисеева, АА Рубан. 2015. elibrary.ru Достижения вузовской науки2 cites.
  917. MEMCOIN2: A Hybrid Proof of Work/Proof of Stake Cryptocurrency with Democratic Control“. A Mackenzie. 2010. Technical Report. http://mc2 … 1 cites.
  918. Alternatives for proof of work, part 1: Proof of stake“. R Patterson. 2015. … /proof-of-stake-proof-of-work-comparison/[cited 13.10 …1 cites.
  919. The economics of proof-of-work“. D Liu. 2007. HeinOnline ISJLP1 cites.
  920. The decrits consensus algorithm: Decentralized agreement without proof of work“. R Pfeiffer. 2014. arxiv.org arXiv preprint arXiv:1411.11011 cites.
  921. The bitcoin mining game: On the optimality of honesty in proof-of-work consensus mechanism“. J Beccuti, C Jaag. 2017. allquantor.at 1 cites.
  922. Memcoin2: a hybrid proof of work/proof of stake cryptocurrency“. A Mackenzie. 2014. decred.org 1 cites.
  923. Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem (Full version)“. A Biryukov, D Khovratovich. 0. cryptolux.org1 cites.
  924. Proof of stake: Definite. an implementation of constant staking rewards to promote increased network activity“. M Croteau, E Litranab. 2014. August 1 cites.
  925. A network-dependent rewarding system: proof-of-mining“. J Lao. 2014. arxiv.org arXiv preprint arXiv:1409.79481 cites.
  926. Building a bitcoin miner on an FPGA“. S Oliveira, F Soares, G Flach, M Johann…. 2012. inf.ufrgs.br XXVII SIM—South …1 cites.
  927. Legal aspects of work-related mental illness and disorder“. S Adler, R Atlas. 2004. search.proquest.com The Israel journal of psychiatry and related …1 cites.
  928. BLOCKCHAIN TIME AND HEISENBERG UNCERTAINTY PRINCIPLE“. R Pérez-Marco. 2016. hal.archives-ouvertes.fr 1 cites.
  929. Barter to bitcoin: the changing visage of transactions“. D Awasthi. 2015. elkjournals.com Elk Asia Pacific Journal of Finance and Risk …1 cites.
  930. Proof of Stake Blockchain: Performance and Scalability for Groupware Communications“. J Spasovski, P Eklund. 2017. researchgate.net Proceedings of the International …1 cites.
  931. Using Block Chain for Peer-to-Peer Proof-of-Location“. G Brambilla, M Amoretti, F Zanichelli. 2016. arxiv.org arXiv preprint arXiv:1607.001741 cites.
  932. Lottery Protocol for Cryptocurrency“. J Kume, M Abe, T Okamoto. 2015. ai.soc.i.kyoto-u.ac.jp SCIS20151 cites.
  933. Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions.“. X Boyen, C Carr, T Haines. 2016. eprint.iacr.org IACR Cryptology ePrint Archive1 cites.
  934. Efficient algorithms for broadcast and consensus based on proofs of work“. L Eckey, S Faust, J Loss. 2017. eprint.iacr.org 1 cites.
  935. Defeating DDoS Attack By Using Software Puzzle Scheme“. AB Kudupudi, MA Kumar. 2017. ijseat.com IJSEAT1 cites.
  936. Survey of consensus protocols on blockchain applications“. LS Sankar, M Sindhu…. 2017. ieeexplore.ieee.org … (ICACCS), 2017 4th …1 cites.
  937. Double-spend Attack Models with Time Advantange for Bitcoin“. C Pinzón, C Rocha. 2016. Elsevier Electronic Notes in Theoretical Computer Science1 cites.
  938. Oligarchic Control of Business-to-Business Blockchains“. LN Lundbaek, M Huth. 2017. ieeexplore.ieee.org Security and Privacy Workshops …1 cites.
  939. RB-PoW: A reputation based approach tocryptographic mitigation of denial-of-serviceattacks“. F LILKAER, C TELJSTEDT. 2013. diva-portal.org 1 cites.
  940. Further applications of the blockchain“. AL Tsilidou, G Foroglou. 2015. inpluslab.sysu.edu.cn 1 cites.
  941. The Disadvantages of the Sanctions Provisions“. A Hernandez. 1989. HeinOnline In Defense of the Alien1 cites.
  942. A theory for lightweight cryptocurrency ledgers“. B White. 2015. . 1 cites.
  943. Metacaptcha: A metamorphic throttling service for the web“. A Dua, T Bui, T Le, N Huynh…. 2014. ieeexplore.ieee.org Network Protocols (ICNP) …1 cites.
  944. States, Federal Welfare Reform and Immigrants: The Challenges of the First Year“. S Steisel, A Morse. 1997. HeinOnline In Defense of the Alien1 cites.
  945. Subchains Facilitate On-chain Scaling and Fast Transaction Verification“. P Rizun. 2016. bitcoinunlimited.info 1 cites.
  946. Traversing Bitcoin’s P2P network: insights into the structure of a decentralised currency“. S Feld, M Schönfeld, M Werner. 2016. inderscienceonline.com International Journal of …1 cites.
  947. Explaining the relationship between organizational commitment, organizational health and employee creativity of the Social Security Organization“. S Salajeghe, A Movagharzade. 2016. ijhcs.com International Journal of Humanities and …1 cites.
  948. Research issues regarding the Bitcoin and Alternative Coins digital currencies“. A Pîrjan, DM Petrosanu, M Huth…. 2015. search.proquest.com Journal of Information …1 cites.
  949. Handling bitcoin conflicts through a glimpse of structure“. T Lajoie-Mazenc, R Ludinard…. 2017. dl.acm.org Proceedings of the …1 cites.
  950. Transaction locking and masternode consensus: A mechanism for mitigating double spending attacks“. E Duffield, H Schinzel, F Gutierrez. 2014. dashpay.cz 1 cites.
  951. The State of Cryptocurrencies, Their Issues and Policy Interactions“. R Subramanian, T Chino. 2015. scholarworks.lib.csusb.edu Journal of International …1 cites.
  952. Short Paper: Service-Oriented Sharding for Blockchains“. AE Gencer, R van Renesse, EG Sirer. 2017. fc17.ifca.ai Financial Cryptography and Data …1 cites.
  953. Method and apparatus for the limitation of the mining of blocks on a block chain“. DR Ferrin. 2016. Google Patents US Patent App. 14/987,8421 cites.
  954. Cryptocurrencies and the Anonymous Nature of Transactions on the Internet“. EA Casale. 2015. ir.library.oregonstate.edu 1 cites.
  955. Sending Message into a Definite Future: Non-Parallelizable Case“. W Mao. 2000. pdfs.semanticscholar.org 1 cites.
  956. Authority Printed Upon Emptiness“. K O’Hara. 2015. ieeexplore.ieee.org IEEE Internet Computing1 cites.
  957. SPAM control using CPU Timestamps“. S Jagannath, R Mohandas. 2013. search.proquest.com International Journal of …1 cites.
  958. A study of digital currency cryptography for business marketing and finance security“. TH Kim. 2016. jse.or.kr Asia-pacific Journal of Multimedia Services Convergent …1 cites.
  959. An Introduction to the Blockchain and Its Implications for Libraries and Medicine“. MB Hoy. 2017. Taylor & Francis Medical Reference Services Quarterly1 cites.
  960. Customization of quality models in software projects to enhance the business value“. V Suma, BR Shubhamangala…. 2013. ieeexplore.ieee.org … Conference (IACC), 2013 …1 cites.
  961. Privacy with Secondary Use of Personal Information“. S Wohlgemuth, K Takaragi…. 2016. researchgate.net MKWI Research-in …1 cites.
  962. Disposable E-mail adresses“. AM Yegenian. 2009. . 1 cites.
  963. Netcoin: A Traceable P2P Electronic Cash System“. H Tewari, EO Nuallain. 2015. ieeexplore.ieee.org Web Services (ICWS), 2015 IEEE …1 cites.
  964. Eventually Returning to Strong Consistency.“. M Vukolic. 2016. pdfs.semanticscholar.org IEEE Data Eng. Bull.1 cites.
  965. The Bitcoin Phenomenon Analysis“. B Tomaš, I Švogor. 2015. domino.fov.uni-mb.si 28th Bled eConference1 cites.
  966. Personal Archive Service System using Blockchain Technology: Case Study, Promising and Challenging“. Z Chen, Y Zhu. 2017. ieeexplore.ieee.org AI & Mobile Services (AIMS), 2017 IEEE …1 cites.
  967. The future of money and further applications of the blockchain“. R Adams, G Parry, P Godsiff, P Ward. 2017. Wiley Online Library Strategic Change1 cites.
  968. A model for collaborative blockchain-based video delivery relying on advanced network services chains“. N Herbaut, N Negru. 2017. ieeexplore.ieee.org IEEE Communications Magazine1 cites.
  969. The cross-section of crypto-currencies as financial assets: An overview“. H Elendner, S Trimborn, B Ong, TM Lee. 2016. econstor.eu 1 cites.
  970. BlockNDN: A bitcoin blockchain decentralized system over named data networking“. T Jin, X Zhang, Y Liu, K Lei. 2017. ieeexplore.ieee.org Ubiquitous and Future Networks …1 cites.
  971. Theory Beyond the Codes“. M Betancourt. 2013. ctheory.net Ctheory< retrieved from http://ctheory. net/articles. aspx1 cites.
  972. DOUBLE SPENDING PREVENTION IN BITCOINS NETWORK“. M Kadam, P Jha, S Jaiswal. 2015. ijcea.com International Journal of Computer …1 cites.
  973. Fully Anonymous Transferable Ecash.“. H Tewari, A Hughes. 2016. eprint.iacr.org IACR Cryptology ePrint Archive1 cites.
  974. Trusted Timestamp in Cryptocurrency Block Chain“. J Klusácek. 2014. eeict.feec.vutbr.cz Student EEICT1 cites.
  975. An anonymous distributed electronic voting system using Zerocoin“. Y Takabatake, D Kotani, Y Okabe. 2016. repository.kulib.kyoto-u.ac.jp 1 cites.
  976. On offline payments with bitcoin“. A Dmitrienko, D Noack, AR Sadeghi…. 2014. Springer … Conference on Financial …1 cites.
  977. Digital Immolation“. J Bonneau. 2010. Springer Cambridge International Workshop on Security …1 cites.
  978. Yet another note on block withholding attack on bitcoin mining pools“. S Bag, K Sakurai. 2016. Springer International Conference on Information Security1 cites.
  979. Overcoming Limits of Blockchain for IoT Applications“. F Buccafurri, G Lax, S Nicolazzo…. 2017. researchgate.net Proceedings of the 12th …1 cites.
  980. Detecting the presence of a vmm through side-effect analysis 15-712 project final report“. J Franklin, M Luk, JM McCune. 2005. ra.adm.cs.cmu.edu Selected Project Reports, Fall …1 cites.
  981. Augmenting a webmail application with cryptographic puzzles to deflect spam“. M Cristea, B Groza. 2011. ieeexplore.ieee.org … , Mobility and Security (NTMS), 2011 4th …1 cites.
  982. Providing better confidentiality and authentication on the Internet using Namecoin and MinimaLT“. F Jacobs. 2014. arxiv.org arXiv preprint arXiv:1407.64531 cites.
  983. Syscoin: A Peer-to-Peer Electronic Cash System with Blockchain-Based Services for E-Business“. J Sidhu. 2017. ieeexplore.ieee.org … Communication and Networks (ICCCN), 2017 26th …1 cites.
  984. Of strategies and structures: Motif-based fingerprinting analysis of online reputation networks“. M Wichtlhuber, S Bücker, R Kluge…. 2016. ieeexplore.ieee.org … (LCN), 2016 IEEE …1 cites.
  985. Introduction to Parallel Computing“. M Skuhersky. 0. mit.edu1 cites.
  986. Quantos somos? The second national population census of Mozambique“. G Harrison. 1998. Taylor & Francis 1 cites.
  987. Ripple Protocol Consensus Algorithm Review“. P Todd. 2015. docshare04.docshare.tips 1 cites.
  988. A Bitcoin system with no mining and no history transactions: Build a compact Bitcoin system“. X Qian. 2014. arxiv.org arXiv preprint arXiv:1404.42751 cites.
  989. Risk based authentication“. NA Allen. 2015. Google Patents US Patent 9,202,0381 cites.
  990. Secure and Trustable Electronic Medical Records Sharing using Blockchain“. A Dubovitskaya, Z Xu, S Ryu, M Schumacher…. 2017. arxiv.org arXiv preprint arXiv …1 cites.
  991. Record Forms in the Syracuse Health Demonstration“. GC Ruhland, IF Thompson. 1926. ajph.aphapublications.org American Journal of Public …1 cites.
  992. Methodology to measure a front end ASIC for physic experiment“. F Druillole. 2003. ieeexplore.ieee.org Nuclear Science Symposium Conference Record …1 cites.
  993. Lastregelung von Web Services mittels Proof-of-Work Funktionen.“. S Golze, G Mühl, MC Jaeger. 2005. pdfs.semanticscholar.org KiVS Kurzbeiträge und …1 cites.
  994. Fairness in Überlastsituationen mittels Proof-Of-Work Funktionen“. S Golze. 2009. depositonce.tu-berlin.de 1 cites.
  995. Postęp w technologii systemów kryptowalutowych“. W Nowakowski. 2015. yadda.icm.edu.pl Elektronika: konstrukcje, technologie …1 cites.
  996. Avaliação da segurança de protocolos criptográficos usados em moedas virtuais“. VHG Moia, MAA Henriques. 0. VII Sétimo Encontro dos Alunos e Docentes do …1 cites.
  997. Bitcoins y el problema de los generales bizantinos“. C Pérez Solà, J Herrera Joancomartí. 2014. rua.ua.es 1 cites.
  998. Децентрализованные сервисы“. МВ Шпеко. 2014. elibrary.ru … системы и технологии в образовании, науке и …1 cites.
  999. Proof-of-Work“. J SVENSSON, J ZEECK. 0. csc.kth.se0 cites.

———————————————————-

(Featured Image: ‘Bitcoin Mining: Mine Like a Professional Miner‘ by Herbert Sim)