Here below is the list of Most Cited Publications about ‘Proof of Work’.

Proof of Work algorithms are used by the majority of present day cryptocurrencies. Different approaches try to resist centralization by special hardware by relying on memory intensive algorithms. Proof-of-work can also be applied to cloud computing and non-blockchain applications, such as reducing spam in email. Generally, these are highly mathematical and game-theoretic scenarios. Some algorithms try to combine proof of work with more useful work, such as finding prime numbers.

Last updated November 19th, 2017.

Most Cited ‘Proof of Work’ Publications

  1. Bitcoin: A peer-to-peer electronic cash system“. S Nakamoto. 2008. 2024 cites.
  2. Authenticated routing for ad hoc networks“. K Sanzgiri, D LaFlamme, B Dahill…. 2005. IEEE Journal on …367 cites.
  3. Hashcash-a denial of service counter-measure“. A Back. 2002. 354 cites.
  4. Majority is not enough: Bitcoin mining is vulnerable“. I Eyal, EG Sirer. 2014. Springer International conference on financial cryptography and …345 cites.
  5. Quantitative analysis of the full bitcoin transaction graph“. D Ron, A Shamir. 2013. Springer … Conference on Financial Cryptography and Data …308 cites.
  6. Bitter to better—how to make bitcoin a better currency“. S Barber, X Boyen, E Shi, E Uzun. 2012. Springer International Conference on Financial …307 cites.
  7. An analysis of anonymity in the bitcoin system“. F Reid, M Harrigan. 2013. Springer Security and privacy in social networks297 cites.
  8. Zerocoin: Anonymous distributed e-cash from bitcoin“. I Miers, C Garman, M Green…. 2013. Security and Privacy (SP) …293 cites.
  9. Fighting spam on social web sites: A survey of approaches and future challenges“. P Heymann, G Koutrika…. 2007. IEEE Internet …288 cites.
  10. Filtering spam with behavioral blacklisting“. A Ramachandran, N Feamster, S Vempala. 2007. Proceedings of the 14th …275 cites.
  11. Moderately hard, memory-bound functions“. M Abadi, M Burrows, M Manasse…. 2005. ACM Transactions on …273 cites.
  12. An empirical study of spam traffic and the use of DNS black lists“. J Jung, E Sit. 2004. Proceedings of the 4th ACM SIGCOMM conference on …268 cites.
  13. Legal violence: Immigration law and the lives of Central American immigrants“. C Menjívar, L Abrego. 2012. American Journal of Sociology252 cites.
  14. Ethereum: A secure decentralised generalised transaction ledger“. G Wood. 2014. Ethereum Project Yellow Paper237 cites.
  15. Zerocash: Decentralized anonymous payments from bitcoin“. EB Sasson, A Chiesa, C Garman…. 2014. Security and Privacy …235 cites.
  16. Security threats in cloud computing“. FB Shaikh, S Haider. 2011. Internet technology and secured …230 cites.
  17. Incentive-aware routing in DTNs“. U Shevade, HH Song, L Qiu…. 2008. Network Protocols, 2008 …229 cites.
  18. Self-assembly of metal nanocrystals on ultrathin oxide for nonvolatile memory applications“. C Lee, J Meteer, V Narayanan, EC Kan. 2005. Springer Journal of Electronic Materials224 cites.
  19. Information propagation in the bitcoin network“. C Decker, R Wattenhofer. 2013. Peer-to-Peer Computing (P2P) …218 cites.
  20. Evaluating user privacy in bitcoin“. E Androulaki, GO Karame, M Roeschlin…. 2013. Springer … Conference on Financial …217 cites.
  21. The session initiation protocol (SIP) and spam“. J Rosenberg, C Jennings. 2008. 209 cites.
  22. Establishing the Genuinity of Remote Computer Systems.“. R Kennell, LH Jamieson. 2003. USENIX Security Symposium201 cites.
  23. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies“. J Bonneau, A Miller, J Clark…. 2015. Security and Privacy …200 cites.
  24. Portcullis: protecting connection setup from denial-of-capability attacks“. B Parno, D Wendlandt, E Shi, A Perrig…. 2007. ACM SIGCOMM …197 cites.
  25. Bitcoin: Economics, technology, and governance“. R Böhme, N Christin…. 2015. American Economic Association The Journal of …195 cites.
  26. The Bitcoin Backbone Protocol: Analysis and Applications.“. JA Garay, A Kiayias, N Leonardos. 2015. EUROCRYPT (2)187 cites.
  27. Proofs of work and bread pudding protocols“. M Jakobsson, A Juels. 1999. Springer Secure Information Networks176 cites.
  28. RE: Reliable Email.“. S Garriss, M Kaminsky, MJ Freedman, B Karp…. 2006. NSDI170 cites.
  29. Bounds on information exchange for Byzantine agreement“. D Dolev, R Reischuk. 1985. Journal of the ACM (JACM)167 cites.
  30. Methods, apparatus and systems for chronicling the activities of field technicians“. S Nielsen, C Chambers, J Farr. 2012. Google Patents US Patent App. 13/465,524166 cites.
  31. Beware the middleman: Empirical analysis of Bitcoin-exchange risk“. T Moore, N Christin. 2013. Springer … Conference on Financial Cryptography and Data …162 cites.
  32. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again“. N Bitansky, R Canetti, A Chiesa, E Tromer. 2012. Proceedings of the 3rd …160 cites.
  33. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries“. JA Kroll, IC Davey, EW Felten. 2013. Proceedings of WEIS157 cites.
  34. The regularisation of unauthorized migrants: Literature survey and country case studies“. A Levinson. 2005. 157 cites.
  35. Time and work tracker“. GR Skinner, MG Lehman. 1997. Google Patents US Patent 5,696,702155 cites.
  36. Optimal mechanism design and money burning“. JD Hartline, T Roughgarden. 2008. Proceedings of the fortieth annual ACM …149 cites.
  37. Using uncleanliness to predict future botnet addresses“. MP Collins, TJ Shimeall, S Faber, J Janies…. 2007. Proceedings of the 7th …145 cites.
  38. On bitcoin and red balloons“. M Babaioff, S Dobzinski, S Oren, A Zohar. 2012. Proceedings of the 13th ACM …142 cites.
  39. Modeling and preventing phishing attacks“. M Jakobsson. 2005. Financial Cryptography142 cites.
  40. Information security economics–and beyond“. R Anderson, T Moore. 2007. Springer Advances in cryptology-crypto 2007136 cites.
  41. Peer-to-peer systems“. R Rodrigues, P Druschel. 2010. Communications of the ACM131 cites.
  42. Proof-of-work proves not to work; version 0.2“. B Laurie, R Clayton. 2004. Workshop on Economics and …130 cites.
  43. Double-spending fast payments in bitcoin“. GO Karame, E Androulaki, S Capkun. 2012. … of the 2012 ACM conference on …129 cites.
  44. Brown-collar jobs: Occupational segregation and earnings of recent-immigrant Latinos“. L Catanzarite. 2000. Sociological Perspectives123 cites.
  45. Dismantling the poverty trap: Disability policy for the twenty‐first century“. DC Stapleton, BL O’day, GA Livermore…. 2006. Wiley Online Library The Milbank …122 cites.
  46. Decentralizing privacy: Using blockchain to protect personal data“. G Zyskind, O Nathan. 2015. Security and Privacy Workshops (SPW …119 cites.
  47. Proofs of work and bread pudding protocols“. BM Jakobsson, A Juels. 2008. Google Patents US Patent 7,356,696117 cites.
  48. On scaling decentralized blockchains“. K Croman, C Decker, I Eyal, AE Gencer, A Juels…. 2016. Springer … Conference on Financial …114 cites.
  49. Bitcoin-NG: A Scalable Blockchain Protocol.“. I Eyal, AE Gencer, EG Sirer, R Van Renesse. 2016. NSDI114 cites.
  50. Network time and work tracker“. GR Skinner, MG Lehman. 1999. Google Patents US Patent 5,963,914112 cites.
  51. Proof nets for unit-free multiplicative-additive linear logic“. DJD Hughes, RJ Van Glabbeek. 2005. ACM Transactions on Computational …111 cites.
  52. The taxation of undocumented immigrants: Separate, unequal, and without representation“. FJ Lipman. 2006. HeinOnline Harv. Latino L. Rev.111 cites.
  53. An Empirical Study of Clustering Behavior of Spammers and Group-based Anti-Spam Strategies.“. F Li, MH Hsieh. 2006. CEAS109 cites.
  54. An analysis of anonymity in the bitcoin system“. F Reid, M Harrigan. 2011. Privacy, Security, Risk and Trust (PASSAT …107 cites.
  55. Cryptographic primitives enforcing communication and storage complexity“. P Golle, S Jarecki, I Mironov. 2002. Springer International Conference on Financial …104 cites.
  56. A next-generation smart contract and decentralized application platform“. V Buterin. 2014. white paper104 cites.
  57. Secure computation without authentication“. B Barak, R Canetti, Y Lindell, R Pass…. 2005. Springer Annual International …100 cites.
  58. Welfare trends in Sweden: balancing the books for the 1990s“. J Palme, A Bergmark, O Backman…. 2002. … of European Social …100 cites.
  59. Mixcoin: Anonymity for Bitcoin with accountable mixes“. J Bonneau, A Narayanan, A Miller, J Clark…. 2014. Springer … Conference on Financial …99 cites.
  60. Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing“. MH Sqalli, F Al-Haidari, K Salah. 2011. Utility and Cloud Computing …98 cites.
  61. Transformations between uml and owl-s“. R Grønmo, MC Jaeger, H Hoff. 2005. Springer European Conference on Model Driven …98 cites.
  62. “When perhaps the real problem is money itself!”: the practical materiality of Bitcoin“. B Maurer, TC Nelms, L Swartz. 2013. Taylor & Francis Social Semiotics97 cites.
  63. Structure and anonymity of the bitcoin transaction graph“. M Ober, S Katzenbeisser, K Hamacher. 2013. Future internet93 cites.
  64. James Joyce“. HS Gorman. 1974. Octagon Press, Limited 93 cites.
  65. Countering DoS attacks with stateless multipath overlays“. A Stavrou, AD Keromytis. 2005. Proceedings of the 12th ACM conference on …93 cites.
  66. How to play almost any mental game over the net-concurrent composition via super-polynomial simulation“. B Barak, A Sahai. 2005. … of Computer Science, 2005. FOCS 2005 …92 cites.
  67. The Midwives Book“. J Sharp. 1985. 92 cites.
  68. NetFence: preventing internet denial of service from inside out“. X Liu, X Yang, Y Xia. 2010. ACM SIGCOMM Computer Communication …90 cites.
  69. Free riding in peer-to-peer networks“. M Karakaya, I Korpeoglu, Ö Ulusoy. 2009. IEEE Internet computing89 cites.
  70. Deanonymisation of clients in Bitcoin P2P network“. A Biryukov, D Khovratovich, I Pustogarov. 2014. Proceedings of the 2014 ACM …88 cites.
  71. Guaranteeing access in spite of distributed service-flooding attacks“. VD Gligor. 2003. Springer Security Protocols Workshop86 cites.
  72. Blockchains and smart contracts for the internet of things“. K Christidis, M Devetsikiotis. 2016. IEEE Access86 cites.
  73. Monte Carlo estimates of the mass gap of the O (2) and O (3) spin models in 1+ 1 dimensions“. G Fox, R Gupta, O Martin, S Otto. 1982. Elsevier Nuclear Physics B86 cites.
  74. Welfare and the unemployment crisis: Sweden in the 1990s“. Å Bergmark, J Palme. 2003. Wiley Online Library International Journal of Social Welfare85 cites.
  75. Innovations in payment technologies and the emergence of digital currencies“. R Ali, J Barrdear, R Clews, J Southgate. 2014. 83 cites.
  76. The economics of Bitcoin and similar private digital currencies“. GP Dwyer. 2015. Elsevier Journal of Financial Stability83 cites.
  77. Transition: The History of a Literary Era 1927-1938“. D McMillan. 1975. Calder Publications Limited 82 cites.
  78. Analysis of hashrate-based double spending“. M Rosenfeld. 2014. arXiv preprint arXiv:1402.200980 cites.
  79. Enabling blockchain innovations with pegged sidechains“. A Back, M Corallo, L Dashjr, M Friedenbach…. 2014. URL: http://www …80 cites.
  80. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication“. M Vukolić. 2015. Springer International Workshop on Open Problems in Network …79 cites.
  81. A unified framework for concurrent security: universal composability from stand-alone non-malleability“. H Lin, R Pass, M Venkitasubramaniam. 2009. … of the forty-first annual ACM …79 cites.
  82. Permacoin: Repurposing bitcoin work for data preservation“. A Miller, A Juels, E Shi, B Parno…. 2014. Security and Privacy (SP) …76 cites.
  83. The effect of stock spam on financial markets“. R Böhme, T Holz. 2006. 76 cites.
  84. Making nursing visible? Gender, technology and the care plan as script“. M Wilson. 2002. Information Technology & People76 cites.
  85. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake“. S King, S Nadal. 2012. self-published paper, August75 cites.
  86. Analyzing interaction between distributed denial of service attacks and mitigation technologies“. WJ Blackert, DM Gregg, AK Castner…. 2003. … and exposition, 2003 …75 cites.
  87. Secure high-rate transaction processing in bitcoin“. Y Sompolinsky, A Zohar. 2015. Springer … Conference on Financial Cryptography and Data …75 cites.
  88. Do the rich get richer? An empirical analysis of the Bitcoin transaction network“. D Kondor, M Pósfai, I Csabai, G Vattay. 2014. PloS one75 cites.
  89. Mitigating distributed denial of service attacks with dynamic resource pricing“. D Mankins, R Krishnan, C Boyd, J Zao…. 2001. … , 2001. ACSAC 2001 …74 cites.
  90. Keeping denial-of-service attackers in the dark“. G Badishi, A Herzberg, I Keidar. 2007. IEEE Transactions on …74 cites.
  91. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin.“. G Karame, E Androulaki…. 2012. IACR Cryptology ePrint …74 cites.
  92. CoinShuffle: Practical decentralized coin mixing for Bitcoin“. T Ruffing, P Moreno-Sanchez, A Kate. 2014. Springer European Symposium on …72 cites.
  93. The miner’s dilemma“. I Eyal. 2015. Security and Privacy (SP), 2015 IEEE Symposium on71 cites.
  94. Secure distributed human computation“. C Gentry, Z Ramzan, S Stubblebine. 2005. … of the 6th ACM conference on …70 cites.
  95. Bitcoin mining and its energy footprint“. KJ O’Dwyer, D Malone. 2014. IET 68 cites.
  96. Propagating trust in ad-hoc networks for reliable routing“. AA Pirzada, A Datta, C McDonald. 2004. Wireless Ad-Hoc Networks …65 cites.
  97. The Illlusory Provisions of Sanctions: The Immigration Reform and Control Act of 1986“. CM Espenoza. 1994. HeinOnline Geo. Immigr. LJ64 cites.
  98. Is Bitcoin a decentralized currency?“. A Gervais, G Karame, S Capkun, V Capkun. 2014. IEEE security & privacy64 cites.
  99. Blockchain technology: principles and applications“. M Pilkington. 2015. Browser Download This Paper63 cites.
  100. SoK: secure messaging“. N Unger, S Dechand, J Bonneau, S Fahl…. 2015. Security and Privacy …62 cites.
  101. Commitcoin: Carbon dating commitments with bitcoin“. J Clark, A Essex. 2012. Springer Financial Cryptography and Data Security61 cites.
  102. Towards Reliable Storage of 56-bit Secrets in Human Memory.“. J Bonneau, SE Schechter. 2014. USENIX Security Symposium61 cites.
  103. Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake [Extended Abstract] y“. I Bentov, C Lee, A Mizrahi, M Rosenfeld. 2014. ACM SIGMETRICS …60 cites.
  104. Enhancing bitcoin security and performance with strong consistency via collective signing“. EK Kogias, P Jovanovic, N Gailly, I Khoffi…. 2016. 25th USENIX Security …60 cites.
  105. Decentralized blockchain technology and the rise of lex cryptographia“. A Wright, P De Filippi. 2015. 60 cites.
  106. Optimal selfish mining strategies in bitcoin“. A Sapirshtein, Y Sompolinsky, A Zohar. 2016. Springer International Conference on …59 cites.
  107. Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks“. S VivinSandar, S Shenai. 2012. International Journal of Computer …58 cites.
  108. Tachograph for motor vehicles“. G Mutz. 1987. Google Patents US Patent 4,644,36857 cites.
  109. Secure outsourced garbled circuit evaluation for mobile devices“. H Carter, B Mood, P Traynor…. 2016. Journal of Computer …57 cites.
  110. The sudden removal of user fees: the perspective of a frontline manager in Burundi“. M Nimpagaritse, MP Bertone. 2011. Health policy and planning56 cites.
  111. Hidden struggles: spaces of power and resistance in informal work in urban Argentina“. R Whitson. 2007. Environment and Planning A56 cites.
  112. Application of the random forest method in studies of local lymph node assay based skin sensitization data“. S Li, A Fedorowicz, H Singh…. 2005. ACS Publications Journal of chemical …55 cites.
  113. Diverticular disease of the colon: a 1968 view.“. I Williams. 1968. Gut54 cites.
  114. Proofs of space“. S Dziembowski, S Faust, V Kolmogorov…. 2015. Springer Annual Cryptology …54 cites.
  115. How many undocumented: The numbers behind the US-Mexico migration talks“. BL Lowell, R Suro. 2002. 54 cites.
  116. Time and work tracker with hardware abstraction layer“. GR Skinner, MG Lehman. 2001. Google Patents US Patent 6,185,51454 cites.
  117. Quantification of overload injuries to thoracolumbar vertebrae and discs in persons exposed to heavy physical exertions or vibration at the workplace Part II …“. P Brinckmann, W Frobin, M Biggemann, M Tillotson…. 1998. Elsevier Clinical …54 cites.
  118. Outsourced proofs of retrievability“. F Armknecht, JM Bohli, GO Karame, Z Liu…. 2014. Proceedings of the 2014 …53 cites.
  119. Towards next-generation botnets“. R Hund, M Hamann, T Holz. 2008. Computer Network Defense, 2008 …52 cites.
  120. Inclusive block chain protocols“. Y Lewenberg, Y Sompolinsky, A Zohar. 2015. Springer International Conference on …51 cites.
  121. ScrambleSuit: A polymorphic network protocol to circumvent censorship“. P Winter, T Pulls, J Fuss. 2013. Proceedings of the 12th ACM workshop on …50 cites.
  122. Cryptocurrencies without proof of work“. I Bentov, A Gabizon, A Mizrahi. 2016. Springer International Conference on Financial …49 cites.
  123. Vuvuzela: Scalable private messaging resistant to traffic analysis“. J Van Den Hooff, D Lazar, M Zaharia…. 2015. Proceedings of the 25th …49 cites.
  124. Blockstack: A Global Naming and Storage System Secured by Blockchains.“. M Ali, JC Nelson, R Shea, MJ Freedman. 2016. USENIX Annual Technical …48 cites.
  125. A moving target DDoS defense mechanism“. H Wang, Q Jia, D Fleck, W Powell, F Li…. 2014. Elsevier Computer …48 cites.
  126. Hourglass schemes: how to prove that cloud files are encrypted“. M Van Dijk, A Juels, A Oprea, RL Rivest…. 2012. Proceedings of the …48 cites.
  127. On the security and performance of proof of work blockchains“. A Gervais, GO Karame, K Wüst, V Glykantzis…. 2016. Proceedings of the …47 cites.
  128. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack“. K Nayak, S Kumar, A Miller, E Shi. 2016. Security and Privacy …47 cites.
  129. Distributed Quota Enforcement for Spam Control.“. M Walfish, JD Zamfirescu, H Balakrishnan, DR Karger…. 2006. NSDI46 cites.
  130. An economic response to unsolicited communication“. T Loder, M Van Alstyne, R Wash. 2006. Advances in Economic Analysis & …46 cites.
  131. Analysis of the blockchain protocol in asynchronous networks“. R Pass, L Seeman, A Shelat. 2017. Springer … International Conference on the Theory and …45 cites.
  132. Proactively Accountable Anonymous Messaging in Verdict.“. H Corrigan-Gibbs, DI Wolinsky, B Ford. 2013. USENIX Security Symposium45 cites.
  133. The problem with Bitcoin“. D Bradbury. 2013. Elsevier Computer Fraud & Security45 cites.
  134. Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money“. GW Peters, E Panayi. 2016. Springer Banking Beyond Banks and Money45 cites.
  135. Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency“. J Becker, D Breuker, T Heide, J Holler…. 2013. Springer The Economics of …44 cites.
  136. Decentralized Anonymous Credentials.“. C Garman, M Green, I Miers. 2014. NDSS44 cites.
  137. Case study of the miner botnet“. D Plohmann, E Gerhards-Padilla. 2012. Cyber Conflict (CYCON) …43 cites.
  138. The stellar consensus protocol: A federated model for internet-level consensus“. D Mazieres. 2015. Stellar Development Foundation43 cites.
  139. Controlling spam through lightweight currency“. D Turner, D Havey. 2004. Proceedings of the Hawaii …43 cites.
  140. Misbehavior in bitcoin: A study of double-spending and accountability“. GO Karame, E Androulaki, M Roeschlin…. 2015. ACM Transactions on …43 cites.
  141. Toward a secure batch verification with group testing for VANET“. CC Lee, YM Lai. 2013. Springer Wireless networks43 cites.
  142. When More Security Equals Less Workplace Safety: Reconsidering US Laws That Disadvantage Unauthorized Workers“. B Lyon. 2003. HeinOnline U. Pa. J. Lab. & Emp. L.43 cites.
  143. Why countries continue to consider regularization“. A Levinson. 2005. Migration Information Source42 cites.
  144. Centrally banked cryptocurrencies“. G Danezis, S Meiklejohn. 2015. arXiv preprint arXiv:1505.0689542 cites.
  145. Toxic Reproductive and Genetic Hazards in the Workplace: Challenging the Myths of the Tort and Workers’ Compensation Systems“. JM Eggen. 1993. HeinOnline Workers’ Comp. L. Rev.42 cites.
  146. Productivity space of information security in an extension of the Gordon-Loeb’s InvestmentModel“. K Matsuura. 2009. Springer Managing Information Risk and the Economics of …41 cites.
  147. Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols.“. D Stebila, L Kuppusamy, J Rangasamy, C Boyd…. 2011. Springer CT-RSA41 cites.
  148. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools“. B Johnson, A Laszka, J Grossklags, M Vasek…. 2014. Springer … Conference on Financial …41 cites.
  149. The weakest failure detector for message passing set-agreement“. C Delporte-Gallet, H Fauconnier, R Guerraoui…. 2008. Springer International Symposium …41 cites.
  150. Bitcoin over Tor isn’t a good idea“. A Biryukov, I Pustogarov. 2015. Security and Privacy (SP), 2015 …41 cites.
  151. spow: On-demand cloud-based eddos mitigation mechanism“. SH Khor, A Nakao. 2009. HotDep (Fifth Workshop on Hot Topics in System …40 cites.
  152. Anonymity of bitcoin transactions“. M Möser. 2013. Münster bitcoin conference40 cites.
  153. Corporate governance and blockchains“. D Yermack. 2017. Review of Finance40 cites.
  154. Bitcoin: Technical background and data analysis“. AI Badev, M Chen. 2014. 40 cites.
  155. A secure sharding protocol for open blockchains“. L Luu, V Narayanan, C Zheng, K Baweja…. 2016. Proceedings of the …40 cites.
  156. Where Is Current Research on Blockchain Technology?—A Systematic Review“. J Yli-Huumo, D Ko, S Choi, S Park, K Smolander. 2016. PloS one40 cites.
  157. Proof of Work can Work.“. D Liu, LJ Camp. 2006. WEIS39 cites.
  158. Occupational issues of allergic contact dermatitis“. KE Andersen. 2003. Springer … archives of occupational and environmental health39 cites.
  159. Towards a theory of trust in networks of humans and computers“. V Gligor, JM Wing. 2011. Springer Security Protocols XIX39 cites.
  160. Catena: A memory-consuming password-scrambling framework“. C Forler, S Lucks, J Wenzel. 2013. 39 cites.
  161. Can welfare reform make disability disappear?“. R Galvin. 2004. Wiley Online Library Australian Journal of Social Issues39 cites.
  162. The security cost of cheap user interaction“. R Böhme, J Grossklags. 2011. Proceedings of the 2011 workshop on New …39 cites.
  163. Systems and methods for protecting against denial of service attacks“. WC Feng, E Kaiser. 2012. Google Patents US Patent 8,321,95538 cites.
  164. Bitcoin is memory“. WJ Luther, J Olson. 2013. 38 cites.
  165. Architecture of the Hyperledger blockchain fabric“. C Cachin. 2016. Workshop on Distributed Cryptocurrencies and …38 cites.
  166. Motag: Moving target defense against internet denial of service attacks“. Q Jia, K Sun, A Stavrou. 2013. Computer Communications and …38 cites.
  167. Primed: community-of-interest-based ddos mitigation“. P Verkaik, O Spatscheck, J Van der Merwe…. 2006. Proceedings of the …38 cites.
  168. Do libertarians dream of electric coins? The material embeddedness of Bitcoin“. H Karlstrøm. 2014. Taylor & Francis Distinktion: Scandinavian Journal of Social Theory37 cites.
  169. The role of gender in user resistance and information systems failure“. M Wilson, D Howcroft. 2000. Springer … and social perspectives on information technology37 cites.
  170. Unconditional welfare benefits and the principle of reciprocity“. S Segall. 2005. Politics, philosophy & economics36 cites.
  171. The hunting of the SNARK“. N Bitansky, R Canetti, A Chiesa, S Goldwasser…. 2017. Springer Journal of …36 cites.
  172. Enhancing ZRTP by using Computational Puzzles.“. H Hlavacs, WN Gansterer, H Schabauer, J Zottl…. 2008. J. UCS36 cites.
  173. Adapting workers’ compensation to the special problems of occupational disease“. L Locke. 1985. HeinOnline Harv. Envtl. L. Rev.35 cites.
  174. To Hash or Not to Hash Again?(In) Differentiability Results for H 2 and HMAC.“. Y Dodis, T Ristenpart, JP Steinberger, S Tessaro. 2012. Springer CRYPTO35 cites.
  175. Demystifying incentives in the consensus computer“. L Luu, J Teutsch, R Kulkarni, P Saxena. 2015. Proceedings of the 22nd ACM …35 cites.
  176. Halting password puzzles“. X Boyen. 2007. Proc. Usenix Security35 cites.
  177. Primecoin: Cryptocurrency with prime number proof-of-work“. S King. 2013. July 7th34 cites.
  178. Proofs of space: When space is of the essence“. G Ateniese, I Bonacina, A Faonio, N Galesi. 2014. Springer International Conference on …34 cites.
  179. R-Chain: A Self-Maintained Reputation Management System in P2P Networks.“. L Liu, S Zhang, KD Ryu, P Dasgupta. 2004. ISCA PDCS34 cites.
  180. The Plight of the Targeted Attacker in a World of Scale.“. C Herley. 2010. WEIS34 cites.
  181. The market for cryptocurrencies“. LH White. 2015. HeinOnline Cato J.34 cites.
  182. About the relation between psycho-analytic training and psycho-analytic therapy“. M Grotjahn. 1954. The International journal of psycho-analysis34 cites.
  183. Botcoin: Monetizing Stolen Cycles.“. DY Huang, H Dharmdasani, S Meiklejohn, V Dave…. 2014. NDSS34 cites.
  184. DoS: Fighting fire with fire“. M Walfish, H Balakrishnan, D Karger, S Shenker. 2005. 33 cites.
  185. Bitcoin mining pools: A cooperative game theoretic analysis“. Y Lewenberg, Y Bachrach, Y Sompolinsky…. 2015. Proceedings of the …33 cites.
  186. The dual receiver cryptosystem and its applications“. T Diament, HK Lee, AD Keromytis, M Yung. 2004. Proceedings of the 11th …33 cites.
  187. Low-Cost Client Puzzles Based on Modular Exponentiation.“. G Karame, S Capkun. 2010. Springer ESORICS33 cites.
  188. Blockchain technology: Beyond bitcoin“. M Crosby, P Pattanayak, S Verma…. 2016. Applied …33 cites.
  189. Speed-Security Tradeoffs in Blockchain Protocols.“. A Kiayias, G Panagiotakos. 2015. IACR Cryptology ePrint …33 cites.
  190. Bitcoin meets strong consistency“. C Decker, J Seidel, R Wattenhofer. 2016. Proceedings of the 17th International …32 cites.
  191. Tampering with the delivery of blocks and transactions in bitcoin“. A Gervais, H Ritzdorf, GO Karame…. 2015. Proceedings of the 22nd …32 cites.
  192. Sybilcontrol: practical sybil defense with computational puzzles“. F Li, P Mittal, M Caesar, N Borisov. 2012. … of the seventh ACM workshop on …32 cites.
  193. Regularization programs for undocumented migrants“. S Sunderhaus. 2007. Migration Letters32 cites.
  194. A domain-specific language for modelling security objectives in a business process models of soa applications“. M Saleem, J Jaafar, M Hassan. 2012. AISS31 cites.
  195. Spacecoin: A cryptocurrency based on proofs of space“. S Park, K Pietrzak, J Alwen, G Fuchsbauer, P Gazi. 2015. 31 cites.
  196. Trust transfer: Encouraging self-recommendations without sybil attack“. JM Seigneur, A Gray, CD Jensen. 2005. Springer iTrust31 cites.
  197. Sharing ledgers for sharing economies: an exploration of mutual distributed ledgers (aka blockchain technology)“. M Mainelli, M Smith. 2015. The Journal of Financial Perspectives31 cites.
  198. The bitcoin P2P network“. JAD Donet, C Pérez-Sola…. 2014. Springer … Conference on Financial …31 cites.
  199. ChoiceNet: toward an economy plane for the Internet“. T Wolf, J Griffioen, KL Calvert, R Dutta…. 2014. ACM SIGCOMM …31 cites.
  200. Labor law after legalization“. MJ Wishnie. 2007. HeinOnline Minn. L. Rev.31 cites.
  201. Financial exclusion in Latin America—or the social costs of not banking the urban poor“. TM Solo. 2008. Environment and Urbanization31 cites.
  202. On Bitcoin as a public randomness source.“. J Bonneau, J Clark, S Goldfeder. 2015. IACR Cryptology ePrint …31 cites.
  203. Test martingales, Bayes factors and p-values“. G Shafer, A Shen, N Vereshchagin, V Vovk. 2011. JSTOR Statistical Science31 cites.
  204. Multi layer approach to defend ddos attacks caused by spam“. D Nagamalai, C Dhinakaran…. 2007. … Engineering, 2007. MUE’ …31 cites.
  205. Virtual office environment“. O Tsatalos, S Karamanlakis. 2006. Google Patents US Patent App. 11/450,87531 cites.
  206. Occupationally related disorders“. DB Baker, PJ Landrigan. 1990. Elsevier Medical Clinics of North America31 cites.
  207. Statistical methods for stochastic differential equations“. M Kessler, A Lindner, M Sorensen. 2012. 30 cites.
  208. Coinparty: Secure multi-party mixing of bitcoins“. JH Ziegeldorf, F Grossmann, M Henze…. 2015. Proceedings of the 5th …30 cites.
  209. The blockchain as a software connector“. X Xu, C Pautasso, L Zhu, V Gramoli…. 2016. … (WICSA), 2016 13th …30 cites.
  210. Formalizing anonymous blacklisting systems“. R Henry, I Goldberg. 2011. Security and Privacy (SP), 2011 IEEE …30 cites.
  211. Secure content access and replication in pure p2p networks“. E Palomar, JME Tapiador, JC Hernandez-Castro…. 2008. Elsevier Computer …29 cites.
  212. Bitcoin: under the hood“. A Zohar. 2015. Communications of the ACM28 cites.
  213. Caught in a web: Immigrant women and domestic violence“. DL Jang. 1994. HeinOnline Clearinghouse Rev.28 cites.
  214. The cryptoanarchists’ answer to cash“. ME Peck. 2012. IEEE Spectrum28 cites.
  215. Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems“. T Swanson. 2015. Report, available online, Apr28 cites.
  216. Transparent data deduplication in the cloud“. F Armknecht, JM Bohli, GO Karame…. 2015. Proceedings of the 22nd …28 cites.
  217. Egalitarianism and exclusion: US guest worker programs and a non-subordination approach to the labor-based admission of nonprofessional foreign national“. AJ Elmore. 2006. HeinOnline Geo. Immigr. LJ28 cites.
  218. Tendermint: Consensus without mining“. J Kwon. 2014. Draft v. 0.6, fall27 cites.
  219. Email traffic: a quantitative snapshot.“. R Clayton. 2007. CEAS27 cites.
  220. Spam zombies from outer space“. J Aycock, N Friess. 2006. 27 cites.
  221. Model-based adaptive dos attack mitigation“. C Barna, M Shtern, M Smit, V Tzerpos…. 2012. Proceedings of the 7th …27 cites.
  222. Fairnet-How to counter free riding in peer-to-peer data structures“. E Buchmann, K Bohm. 2004. Springer Lecture Notes in Computer Science26 cites.
  223. Time-lock puzzles from randomized encodings“. N Bitansky, S Goldwasser, A Jain, O Paneth…. 2016. Proceedings of the …26 cites.
  224. Migratory modernity and the cosmology of consumption in Côte d’Ivoire“. S Newell. 2005. Migration and economy: Global and local dynamics26 cites.
  225. A study of geolocation databases“. Y Shavitt, N Zilberman. 2010. arXiv preprint arXiv:1005.567426 cites.
  226. The false premises and promises of Bitcoin“. BP Hanley. 2013. arXiv preprint arXiv:1312.204826 cites.
  227. On the privacy provisions of bloom filters in lightweight bitcoin clients“. A Gervais, S Capkun, GO Karame…. 2014. Proceedings of the 30th …26 cites.
  228. Bitcoin: a first assessment“. D Woo. 2013. 26 cites.
  229. Survey on new solutions against distributed denial of service attacks“. C SUN, B Liu. 2009. Acta Electronica Sinica25 cites.
  230. Hybrid consensus: Efficient consensus in the permissionless model“. R Pass, E Shi. 2017. LIPIcs-Leibniz International Proceedings in …25 cites.
  231. Cumulative Injury of Disease Claims: An Attempt to Define Employers’ Liability for Workers’ Compensation“. J LaDou, LE Mulryan, KJ McCarthy. 1980. HeinOnline Am. JL & Med.25 cites.
  232. Interdisciplinary writing“. D Hamilton. 1980. JSTOR College English25 cites.
  233. Bearing Witness to Economic Injustices of Undocumented Immigrant Families: A New Class of Undeserving Poor“. FJ Lipman. 2006. HeinOnline Nev. LJ25 cites.
  234. Difficulty control for blockchain-based consensus systems“. D Kraft. 2016. Springer Peer-to-Peer Networking and Applications25 cites.
  235. An analytical model for DDoS attacks and defense“. Y Xiang, W Zhou, Z Li. 2006. Computing in the Global Information …25 cites.
  236. Blockchain-the Gateway to Trust-Free Cryptographic Transactions.“. R Beck, JS Czepluch, N Lollike, S Malone. 2016. ECIS25 cites.
  237. The regulation of respiration during muscular work“. USV EULER, G Liljestrand. 1946. Wiley Online Library Acta Physiologica24 cites.
  238. Near field communications handbook“. SA Ahson, M Ilyas. 2011. 24 cites.
  239. Time-Lock Puzzles in the Random Oracle Model.“. M Mahmoody, T Moran, SP Vadhan. 2011. Springer CRYPTO24 cites.
  240. On power splitting games in distributed computation: The case of bitcoin pooled mining“. L Luu, R Saha, I Parameshwaran…. 2015. … (CSF), 2015 IEEE …24 cites.
  241. Peer-to-Peer systems and applications“. K Wehrle, R Steinmetz. 2005. LNCS24 cites.
  242. Enforcing collaboration in peer-to-peer routing services“. T Moreton, A Twigg. 2003. Springer iTrust24 cites.
  243. Medrec: Using blockchain for medical data access and permission management“. A Azaria, A Ekblaw, T Vieira…. 2016. Open and Big Data (OBD …24 cites.
  244. Economics and security resource page“. R Anderson. 2005. undated Web page. As of November24 cites.
  245. Proof-of-Work“. B Laurie, R Clayton. 2004. Proves Not to Work” WEAS23 cites.
  246. Re: Bitcoin P2P e-cash paper“. S Nakamoto. 2008. The Cryptography Mailing List23 cites.
  247. Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees“. M Möser, R Böhme. 2015. Springer … Conference on Financial Cryptography and Data …23 cites.
  248. Towards Denial-of-Service-Resilient Key Agreement Protocols.“. D Stebila, B Ustaoglu. 2009. Springer ACISP23 cites.
  249. Towards mitigation of low and slow application ddos attacks“. M Shtern, R Sandel, M Litoiu, C Bachalo…. 2014. … (IC2E), 2014 IEEE …23 cites.
  250. A Survey of Attacks on Ethereum Smart Contracts (SoK)“. N Atzei, M Bartoletti, T Cimoli. 2017. Springer … Conference on Principles of Security and …23 cites.
  251. Central American immigrant workers and legal violence in Phoenix, Arizona“. C Menjívar. 2013. Springer Latino Studies23 cites.
  252. Preventing massive automated access to web resources“. A Basso, S Sicco. 2009. Elsevier computers & security23 cites.
  253. The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology“. W Mougayar. 2016. 23 cites.
  254. Ouroboros: A provably secure proof-of-stake blockchain protocol“. A Kiayias, A Russell, B David, R Oliynykov. 2017. Springer Annual International …22 cites.
  255. Towards risk scoring of Bitcoin transactions“. M Möser, R Böhme, D Breuker. 2014. Springer International Conference on Financial …22 cites.
  256. Fruitchains: A fair blockchain“. R Pass, E Shi. 2017. Proceedings of the ACM Symposium on Principles of …22 cites.
  257. Home media atomizer: remote sharing of home content-without semi-trusted proxies“. P Belimpasakis, S Moloney, V Stirbu…. 2008. IEEE Transactions …22 cites.
  258. An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design.“. HA Kalodner, M Carlsten, P Ellenbogen…. 2015. WEIS22 cites.
  259. Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions“. A Miller, A Kosba, J Katz, E Shi. 2015. Proceedings of the 22nd ACM SIGSAC …22 cites.
  260. Payment-Based Email.“. DA Turner, N Deng. 2004. SNPD22 cites.
  261. Rhetoric of enrollment and acts of resistance: information technology as text“. M Wilson. 2003. Springer Global and organizational discourse about information …22 cites.
  262. Queue Management as a DoS counter-measure?“. D Boteanu, JM Fernandez, J McHugh, J Mullins. 2007. Springer ISC22 cites.
  263. The role of RFID in the mobile phone“. JCL Calvet. 2005. Telektronikk22 cites.
  264. New Kids on the Blockchain: How Bitcoin’s Technology Could Reinvent the Stock Market“. L Lee. 2015. HeinOnline Hastings Bus. LJ22 cites.
  265. Equihash: Asymmetric proof-of-work based on the generalized birthday problem“. A Biryukov, D Khovratovich. 2017. Ledger21 cites.
  266. Blockchain thinking: The brain as a dac (decentralized autonomous organization)“. M Swan. 2015. Texas Bitcoin Conference21 cites.
  267. Beyond Cryptocurrencies-A Taxonomy of Decentralized Consensus Systems“. F Glaser, L Bezzenberger. 2015. 21 cites.
  268. An adaptive authentication protocol based on reputation for peer-to-peer system“. H Lee, K Kim. 2003. … on Cryptography and Information Security (SCIS)21 cites.
  269. Corda: An Introduction“. RG Brown, J Carlyle, I Grigg, M Hearn. 2016. R3 CEV, August21 cites.
  270. Reconstructing Hash Reversal based Proof of Work Schemes.“. J Green, J Juen, O Fatemieh, R Shankesi…. 2011. LEET20 cites.
  271. Bitmessage: A peer-to-peer message authentication and delivery system“. J Warren. 2012. white paper (27 November 2012), https://bitmessage …20 cites.
  272. A TorPath to TorCoin: proof-of-bandwidth altcoins for compensating relays“. M Ghosh, M Richardson, B Ford, R Jansen. 2014. 20 cites.
  273. The case for public work“. W Feng, E Kaiser. 2007. IEEE Global Internet Symposium, 200720 cites.
  274. An efficient confidentiality-preserving proof of ownership for deduplication“. L González-Manzano, A Orfila. 2015. Elsevier Journal of Network and Computer …20 cites.
  275. Publicly verifiable proofs of sequential work“. M Mahmoody, T Moran, S Vadhan. 2013. … of the 4th conference on Innovations …20 cites.
  276. Security when people matter: structuring incentives for user behavior“. R Wash, JK MacKie-Mason. 2007. … of the ninth international conference on …20 cites.
  277. Introduction to bitcoins: a pseudo-anonymous electronic currency system“. S Martins, Y Yang. 2011. Proceedings of the 2011 Conference of the Center …20 cites.
  278. Keeping denial-of-service attackers in the dark“. G Badishi, A Herzberg, I Keidar. 2005. Springer International Symposium on Distributed …20 cites.
  279. Tradeoff cryptanalysis of memory-hard functions“. A Biryukov, D Khovratovich. 2014. Springer International Conference on the Theory and …20 cites.
  280. Analyzing the Deployment of Bitcoin’s P2P Network under an AS-level Perspective“. S Feld, M Schönfeld, M Werner. 2014. Elsevier Procedia Computer Science20 cites.
  281. Economics of blockchain“. S Davidson, P De Filippi, J Potts. 2016. 20 cites.
  282. DaaS: DDoS mitigation-as-a-service“. SH Khor, A Nakao. 2011. Applications and the Internet (SAINT), 2011 …20 cites.
  283. SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains.“. L Luu, V Narayanan, K Baweja, C Zheng…. 2015. IACR Cryptology …20 cites.
  284. A guided tour puzzle for denial of service prevention“. M Abliz, T Znati. 2009. Computer Security Applications Conference …20 cites.
  285. Moving Beyond Bitcoin to an Endogenous Theory of Decentralized Ledger Technology Regulation: An Initial Proposal“. CL Reyes. 2016. 20 cites.
  286. Digital currencies, decentralized ledgers, and the future of central banking“. M Raskin, D Yermack. 2016. 20 cites.
  287. Some simple economics of the blockchain“. C Catalini, JS Gans. 2016. 20 cites.
  288. The Use of Calculations in Petrology: A study for students“. FF Grout. 1926. The Journal of Geology20 cites.
  289. Introduction to distributed hash tables“. E Rescorla, N Resonance. 2006. IETF-65 Technical Plenary19 cites.
  290. The legal status of online currencies: are bitcoins the future?“. R Bollen. 2013. Browser Download This Paper19 cites.
  291. Trusting records: is Blockchain technology the answer?“. VL Lemieux, VL Lemieux. 2016. Records Management Journal19 cites.
  292. Hindering false event dissemination in VANETs with proof-of-work mechanisms“. E Palomar, JM de Fuentes, AI González-Tablas…. 2012. Elsevier … Research Part C …18 cites.
  293. On the feasibility of a censorship resistant decentralized name system“. M Wachs, M Schanzenbach, C Grothoff. 2014. Springer Foundations and Practice of …18 cites.
  294. Resource inflation threats to denial of service countermeasures“. R Shankesi, O Fatemieh, CA Gunter. 2010. 18 cites.
  295. When bitcoin mining pools run dry“. A Laszka, B Johnson, J Grossklags. 2015. Springer International Conference on Financial …18 cites.
  296. Formal modelling and automatic detection of resource exhaustion attacks“. B Groza, M Minea. 2011. Proceedings of the 6th ACM Symposium on …17 cites.
  297. Challenges in protecting tor hidden services from botnet abuse“. N Hopper. 2014. Springer … Conference on Financial Cryptography and Data …17 cites.
  298. Bitcoin and beyond“. A Extance. 2015. Nature17 cites.
  299. An integrated approach to cryptographic mitigation of denial-of-service attacks“. J Rangasamy, D Stebila, C Boyd, JG Nieto. 2011. Proceedings of the 6th ACM …17 cites.
  300. Can currency competition work?“. J Fernández-Villaverde, D Sanches. 2016. 17 cites.
  301. Using client puzzles to mitigate distributed denial of service attacks in the tor anonymous routing environment“. NA Fraser, DJ Kelly, RA Raines…. 2007. … , 2007. ICC’07. IEEE …17 cites.
  302. Questions related to Bitcoin and other Informational Money“. JA Bergstra, K de Leeuw. 2013. arXiv preprint arXiv:1305.595617 cites.
  303. IRCA’s antidiscrimination provisions: what went wrong?“. R Perotti. 1992. JSTOR International Migration Review17 cites.
  304. Analyzing Internet e-mail date-spoofing“. MT Banday, FA Mir, JA Qadri, NA Shah. 2011. Elsevier Digital Investigation17 cites.
  305. The IoT electric business model: Using blockchain technology for the internet of things“. Y Zhang, J Wen. 2017. Springer Peer-to-Peer Networking and Applications17 cites.
  306. The impact and potential of blockchain on securities transaction lifecycle“. M Mainelli, A Milne. 2016. 17 cites.
  307. Bootstrapping Communications into an Anti-Censorship System.“. P Lincoln, I Mason, PA Porras, V Yegneswaran…. 2012. FOCI16 cites.
  308. The politics of cryptography: Bitcoin and the ordering machines“. Q DuPont. 2014. Journal of Peer Production16 cites.
  309. Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing.“. A Biryukov, D Dinu, D Khovratovich. 2015. IACR Cryptology ePrint Archive16 cites.
  310. Pow-based distributed cryptography with no trusted setup“. M Andrychowicz, S Dziembowski. 2015. Springer Annual Cryptology Conference16 cites.
  311. Is disruptive blockchain technology the future of financial services?“. LJ Trautman. 2016. 16 cites.
  312. mod_kaPoW: Mitigating DoS with transparent proof-of-work“. E Kaiser. 2007. Proceedings of the 2007 ACM CoNEXT conference15 cites.
  313. Blackcoin’s proof-of-stake protocol v2“. P Vasin. 2014. 15 cites.
  314. Bitcoin mining acceleration and performance quantification“. JA Dev. 2014. Electrical and Computer Engineering (CCECE), 2014 …15 cites.
  315. A survey of P2P Network security“. L Washbourne. 2015. arXiv preprint arXiv:1504.0135815 cites.
  316. Spam-I-am: A Proposal for Spam Control using Distributed Quota Management“. H Balakrishnan, D Karger. 2004. 3rd ACM SIGCOMM Workshop on Hot …15 cites.
  317. Performance Benchmarking of BPEL Engines: A Comparison Framework, Status Quo Evaluation and Challenges.“. C Röck, S Harrer, G Wirtz. 2014. SEKE15 cites.
  318. Demands and anxiety: The effects of the new immigration law“. CL Wolchok. 1997. HeinOnline Hum. Rts.15 cites.
  319. Building trust in storage outsourcing: Secure accounting of utility storage“. V Kher, Y Kim. 2007. … Distributed Systems, 2007. SRDS 2007. 26th …15 cites.
  320. Method and apparatus for using client puzzles to protect against denial-of-service attacks“. CL Schuba, E Guttman. 2005. Google Patents US Patent 6,944,66315 cites.
  321. Smart contracts, Bitcoin bots, and consumer protection“. J Fairfield. 2014. Wash. & Lee L. Rev. Online15 cites.
  322. Cryptofinance“. CR Harvey. 2016. Browser Download This Paper15 cites.
  323. On the complexity of scrypt and proofs of space in the parallel random oracle model“. J Alwen, B Chen, C Kamath, V Kolmogorov…. 2016. Springer … Conference on the …15 cites.
  324. Cryptocurrencies as a disruption? empirical findings on user adoption and future potential of bitcoin and co“. AW Baur, J Bühler, M Bick, CS Bonorden. 2015. Springer … on e-Business, e-Services and …15 cites.
  325. Cryptocurrency value formation: An empirical study leading to a cost of production model for valuing bitcoin“. AS Hayes. 2017. Elsevier Telematics and Informatics15 cites.
  326. XFT: Practical Fault Tolerance beyond Crashes.“. S Liu, P Viotti, C Cachin, V Quéma, M Vukolic. 2016. OSDI15 cites.
  327. Undocumented Workers and the NLRA:” Hoffman Plastic Compounds” and Beyond“. O Baird. 2003. JSTOR The Labor Lawyer15 cites.
  328. Collaborative use of individual search histories“. A Komlodi, WG Lutters. 2007. Interacting with Computers15 cites.
  329. Throttling Outgoing SPAM for Webmail Services.“. Z Zhong, K Huang, K Li. 2005. CEAS15 cites.
  330. Poverty, Social Exclusion and Ethnicity in Serbia and Montenegro: The Case of the Roma“. C Bodewig, A Sethi. 2005. 15 cites.
  331. Криптовалюта как феномен современной информационной экономики: проблемы теоретического осмысления“. ДС Вахрушев, ОВ Железов. 2014. Интернет-журнал Науковедение15 cites.
  332. An (almost) constant-effort solution-verification proof-of-work protocol based on merkle trees“. F Coelho. 2008. Springer Lecture Notes in Computer Science14 cites.
  333. It Will Cost You Nothing to’Kill’a Proof-of-Stake Crypto-Currency“. N Houy. 2014. Browser Download This Paper14 cites.
  334. Can we stabilize the price of a Cryptocurrency?: Understanding the design of Bitcoin and its potential to compete with Central Bank money“. M Iwamura, Y Kitamura, T Matsumoto, K Saito. 2014. 14 cites.
  335. Exploring the Bitcoin Network.“. A Baumann, B Fabian, M Lischke. 2014. WEBIST (1)14 cites.
  336. Efficient and secure decentralized network size estimation“. N Evans, B Polot, C Grothoff. 2012. Springer NETWORKING 201214 cites.
  337. Bitcoin will bite the dust“. K Dowd, M Hutchinson. 2015. HeinOnline Cato J.14 cites.
  338. Bootstrapping trust in online dating: Social verification of online dating profiles“. G Norcie, E De Cristofaro, V Bellotti. 2013. Springer International Conference on Financial …14 cites.
  339. A security authentication method based on trust evaluation in VANETs“. A Zhou, J Li, Q Sun, C Fan, T Lei, F Yang. 2015. Springer EURASIP Journal on Wireless …14 cites.
  340. A robust mechanism for defending distributed denial of service attacks on web servers“. J Sen. 2011. arXiv preprint arXiv:1103.333314 cites.
  341. TorWard: Discovery of malicious traffic over Tor“. Z Ling, J Luo, K Wu, W Yu, X Fu. 2014. INFOCOM, 2014 Proceedings …14 cites.
  342. Fastpass: Providing first-packet delivery“. D Wendlandt, DG Andersen, A Perrig. 2006. 14 cites.
  343. The rise of’Class Apartheid’in accessing secondary schools in Sandton, Gauteng“. J Bell, TM McKay. 2011. Southern African Review of Education with …14 cites.
  344. Blockchain for IoT security and privacy: The case study of a smart home“. A Dorri, SS Kanhere, R Jurdak…. 2017. Pervasive Computing …14 cites.
  345. On reverse-engineering S-Boxes with hidden design criteria or structure“. A Biryukov, L Perrin. 2015. Springer Annual Cryptology Conference14 cites.
  346. An agri-food supply chain traceability system for China based on RFID & blockchain technology“. F Tian. 2016. Service Systems and Service Management (ICSSSM) …14 cites.
  347. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams“. NZ Aitzhan, D Svetinovic. 2016. IEEE Transactions on Dependable …14 cites.
  348. Distributed Cryptography Based on the Proofs of Work.“. M Andrychowicz, S Dziembowski. 2014. IACR Cryptology ePrint Archive13 cites.
  349. A simulation model for analysis of attacks on the bitcoin peer-to-peer network“. T Neudecker, P Andelfinger…. 2015. … Management (IM), 2015 …13 cites.
  350. Internet protocol adoption: Learning from Bitcoin“. R Böhme. 2013. IAB Workshop on Internet Technology …13 cites.
  351. Deregulating the Market for Legal Services in the European Community: Freedom of Establishment and Freedom to Provide Services for EC Lawyers in the Federal …“. H Eidenmüller. 1990. Wiley Online Library The Modern Law Review13 cites.
  352. Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins“. T Ruffing, A Kate, D Schröder. 2015. Proceedings of the 22nd ACM SIGSAC …13 cites.
  353. Controlling Spam by Secure Internet Content Selection.“. A Herzberg. 2004. Springer SCN13 cites.
  354. When your sensor earns money: exchanging data for cash with Bitcoin“. D Wörner, T von Bomhard. 2014. Proceedings of the 2014 ACM International …13 cites.
  355. The blockchain anomaly“. C Natoli, V Gramoli. 2016. … and Applications (NCA), 2016 IEEE 15th …13 cites.
  356. Hiding the input-size in secure two-party computation“. Y Lindell, K Nissim, C Orlandi. 2013. Springer … Conference on the Theory and Application …13 cites.
  357. Taking a bit out of crime: Bitcoin and cross-border tax evasion“. T Slattery. 2014. HeinOnline Brook. J. Int’l L.13 cites.
  358. Research and challenges on bitcoin anonymity“. J Herrera-Joancomartí. 2015. Springer Data Privacy Management, Autonomous …13 cites.
  359. On Trees, Chains and Fast Transactions in the Blockchain.“. A Kiayias, G Panagiotakos. 2016. IACR Cryptology ePrint Archive13 cites.
  360. Bitcoin: bubble or blockchain“. P Godsiff. 2015. Springer Agent and Multi-Agent Systems: Technologies and …13 cites.
  361. A multi-faceted approach towards spam-resistible mail“. MW Wu, Y Huang, SK Lu, Y Chen…. 2005. … 2005. Proceedings. 11th …13 cites.
  362. Cuckoo Cycle: a memory-hard proof-of-work system.“. J Tromp. 2014. IACR Cryptology ePrint Archive12 cites.
  363. Work Stealing for Time-constrained Octree Exploration: Application to Real-time 3D Modeling.“. LP Soares, C Ménier, B Raffin, JL Roch. 2007. EGPGV12 cites.
  364. Progress in cryptology—AFRICACRYPT 2008“. S Vaudenay. 2008. Springer First international conference on cryptology in Africa …12 cites.
  365. Blockchain contract: A complete consensus using blockchain“. H Watanabe, S Fujimura, A Nakadaira…. 2015. … (GCCE), 2015 IEEE …12 cites.
  366. Cryptocurrency and the Problem of Intermediation“. C Harwick. 2015. 12 cites.
  367. Anti-vamming trust enforcement in peer-to-peer voip networks“. N Banerjee, S Saklikar, S Saha. 2006. … of the 2006 international conference on …12 cites.
  368. Route bazaar: Automatic interdomain contract negotiation“. I Castro, A Panda, B Raghavan, S Shenker, S Gorinsky. 2015. 12 cites.
  369. Harvesting verifiable challenges from oblivious online sources“. JA Halderman, B Waters. 2007. Proceedings of the 14th ACM conference on …12 cites.
  370. Teaching Spam and Spyware at the University of C@ 1g4ry.“. J Aycock. 2006. CEAS12 cites.
  371. The Next Generation of E-Verify: Getting Employment Verification Right“. DM Meissner, MR Rosenblum. 2009. 12 cites.
  372. SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam“. H Tu, A Doupé, Z Zhao, GJ Ahn. 2016. Security and Privacy (SP) …12 cites.
  373. Negative influences of the disability compensation system: perspectives for the clinician“. JL Seres, RI Newman. 1983. Seminars in Neurology12 cites.
  374. Formal verification of smart contracts: Short paper“. K Bhargavan, A Delignat-Lavaud, C Fournet…. 2016. Proceedings of the …12 cites.
  375. A cultural analysis of information technology offshore outsourcing: an exercise in multi-sited ethnography of virtual work“. T Eaton. 2011. 12 cites.
  376. Controlled virtual resource access to mitigate economic denial of sustainability (edos) attacks against cloud infrastructures“. ZA Baig, F Binbeshr. 2013. … and Big Data (CloudCom-Asia), 2013 …12 cites.
  377. Blockchain thinking: The brain as a decentralized autonomous corporation [commentary]“. M Swan. 2015. IEEE Technology and Society Magazine12 cites.
  378. Experimental evaluations of expert and non-expert computer users’ mental models of security risks“. LJ Camp, F Asgharpour, D Liu…. 2007. Proceedings of WEIS …12 cites.
  379. Denial of service: prevention, modelling and detection“. J Smith. 2007. 12 cites.
  380. Smart contract templates: foundations, design landscape and research directions“. CD Clack, VA Bakshi, L Braine. 2016. arXiv preprint arXiv:1608.0077112 cites.
  381. CORDON–a taxonomy of internet censorship resistance strategies“. T Elahi, I Goldberg. 2012. University of Waterloo CACR12 cites.
  382. Bitcoin’s security model revisited“. Y Sompolinsky, A Zohar. 2016. arXiv preprint arXiv:1605.0919312 cites.
  383. Solidus: An incentive-compatible cryptocurrency based on permissionless Byzantine consensus“. I Abraham, D Malkhi, K Nayak, L Ren…. 2016. arXiv preprint arXiv …12 cites.
  384. Mirage: Towards deployable DDoS defense for web applications“. P Mittal, D Kim, YC Hu, M Caesar. 2011. arXiv preprint arXiv:1110.106012 cites.
  385. Managerial challenges of publicly funded principal investigators“. JA Cunningham, P O’Reilly, C O’Kane…. 2015. International …12 cites.
  386. Bitcoin and the future of digital payments“. WJ Luther. 2015. Browser Download This Paper12 cites.
  387. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies“. M Apostolaki, A Zohar…. 2016. arXiv preprint arXiv …12 cites.
  388. Discovering bitcoin’s public topology and influential nodes“. A Miller, J Litton, A Pachulski, N Gupta, D Levin…. 2015. et al.12 cites.
  389. Do you get what you pay for? using proof-of-work functions to verify performance assertions in the cloud“. F Koeppe, J Schneider. 2010. Cloud Computing Technology and …11 cites.
  390. Performance comparison of executing fast transactions in bitcoin network using verifiable code execution“. P Singh, BR Chandavarkar, S Arora…. 2013. … (ADCONS), 2013 2nd …11 cites.
  391. Is Bitcoin the Only Cryptocurrency in the Town? Economics of Cryptocurrency and Friedrich A. Hayek“. M Iwamura, Y Kitamura, T Matsumoto. 2014. 11 cites.
  392. A novel DDoS attack defending framework with minimized bilateral damages“. Y Chen, WS Ku, K Sakai…. 2010. … Conference (CCNC), 2010 …11 cites.
  393. Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.“. H Narasimhan, V Varadarajan, CP Rangan. 2010. Springer ISPEC11 cites.
  394. When cryptocurrencies mine their own business“. J Teutsch, S Jain, P Saxena. 2016. Springer … on Financial Cryptography and Data Security11 cites.
  395. The blockchain and kudos: A distributed system for educational record, reputation and reward“. M Sharples, J Domingue. 2016. Springer European Conference on Technology …11 cites.
  396. Blockchain challenges and opportunities: A survey“. Z Zheng, S Xie, HN Dai, H Wang. 2016. Work Pap11 cites.
  397. Why buy when you can rent?“. J Bonneau. 2016. Springer … Conference on Financial Cryptography and Data …11 cites.
  398. Blockchain and its coming impact on financial services“. K Fanning, DP Centers. 2016. Wiley Online Library Journal of Corporate Accounting & …11 cites.
  399. twister-a P2P microblogging platform“. M Freitas. 2013. arXiv preprint arXiv:1312.715211 cites.
  400. A secure distance-based RFID identification protocol with an off-line back-end database“. P Peris-Lopez, A Orfila, E Palomar…. 2012. Springer Personal and Ubiquitous …11 cites.
  401. A bit of a problem: national and extraterritorial regulation of virtual currency in the age of financial disintermediation“. I Pflaum, E Hateley. 2013. HeinOnline Geo. J. Int’l L.11 cites.
  402. Ledgers and Law in the Blockchain“. Q DuPont, B Maurer. 2015. Kings Review (23 June 2015) http://kingsreview …11 cites.
  403. Notes on a displaced womanhood: Albanian refugee women in Southern Italy“. DL Zinn, A Rivera. 1995. Anthropology of East Europe …11 cites.
  404. To bit or not to bit?[Bitcoin cryptocurrency]“. C Evans-Pughe, A Novikov, V Vitaliev. 2014. IET Engineering & Technology11 cites.
  405. Beyond bitcoin enabling smart government using blockchain technology“. S Ølnes. 2016. Springer … Conference on Electronic Government and the …11 cites.
  406. Homomorphic payment addresses and the pay-to-contract protocol“. I Gerhardt, T Hanke. 2012. arXiv preprint arXiv:1212.325711 cites.
  407. Augur: a decentralized, open-source platform for prediction markets“. J Peterson, J Krug. 2015. arXiv preprint arXiv:1501.0104211 cites.
  408. How to Build Time-Lock Encryption.“. T Jager. 2015. IACR Cryptology ePrint Archive11 cites.
  409. Game of detections: how are security vulnerabilities discovered in the wild?“. M Hafiz, M Fang. 2016. Springer Empirical Software Engineering11 cites.
  410. Pay as you browse: microcomputations as micropayments in web-based services“. GO Karame, A Francillon, S Čapkun. 2011. Proceedings of the 20th …11 cites.
  411. The honeynet quarantine: reducing collateral damage caused by early intrusion response“. B Todtmann, S Riebach…. 2007. Networking, 2007. ICN’07 …11 cites.
  412. The other side of the coin: User experiences with bitcoin security and privacy“. K Krombholz, A Judmayer, M Gusenbauer…. 2016. Springer … Conference on Financial …11 cites.
  413. DDoS attacks in service clouds“. S Alqahtani, RF Gamble. 2015. System Sciences (HICSS), 2015 48th …11 cites.
  414. Exponential Memory-Bound Functions for Proof of Work Protocols.“. F Coelho. 2005. IACR Cryptology ePrint Archive10 cites.
  415. Proof-of-work as anonymous micropayment: Rewarding a Tor relay“. A Biryukov, I Pustogarov. 2015. Springer … on Financial Cryptography and Data Security10 cites.
  416. Preventing network denial of service attacks using an accumulated proof-of-work approach“. M Baugher. 2009. Google Patents US Patent 7,600,25510 cites.
  417. kapow webmail: Effective disincentives against spam“. W Feng. 2010. Citeseer In Proc. of 7th CEAS10 cites.
  418. Blockchain contract: Securing a blockchain applied to smart contracts“. H Watanabe, S Fujimura, A Nakadaira…. 2016. … (ICCE), 2016 IEEE …10 cites.
  419. Secure business process modelling of SOA applications using” UML-SOA-Sec“. MQ Saleem, J Jaafar, MF Hassan. 2012. International Journal of Innovative …10 cites.
  420. Denial-of-service resistance in key establishment“. J Smith, S Tritilanunt, C Boyd…. 2007. … Journal of Wireless …10 cites.
  421. A protocol for secure content distribution in pure p2p networks“. E Palomar, JM Estevez-Tapiador…. 2006. Database and Expert …10 cites.
  422. Making currency inexpensive with iOwe“. D Levin, A Schulman, K LaCurts…. 2011. Proceedings of the …10 cites.
  423. Profit-driven abuses of virtual currencies“. DY Huang. 2013. University of California, San Diego10 cites.
  424. Trustworthy routing with the AODV protocol“. AA Pirzada, A Datta, C Mcdonald. 2004. … Conference, 2004. INCC …10 cites.
  425. A taxonomy of cloud attack consequences and mitigation strategies: The Role of Access Control and Privileged Access Management“. KS Tep, B Martini, R Hunt…. 2015. Trustcom/BigDataSE/ISPA …10 cites.
  426. Finding and counting cliques and independent sets in r-uniform hypergraphs“. R Yuster. 2006. Elsevier Information Processing Letters10 cites.
  427. Towards a more democratic mining in bitcoins“. G Paul, P Sarkar, S Mukherjee. 2014. Springer International Conference on Information …10 cites.
  428. Bitcoin Developer Reference“. K Okupski. 2014. Availabl e at http://enetium. com/resources/Bitcoin. pdf10 cites.
  429. A cloudlet-based multi-lateral resource exchange framework for mobile users“. Y Wu, L Ying. 2015. Computer Communications (INFOCOM), 2015 …10 cites.
  430. Hiding transaction amounts and balances in bitcoin“. E Androulaki, GO Karame. 2014. Springer International Conference on Trust and …10 cites.
  431. Certified bitcoins“. G Ateniese, A Faonio, B Magri…. 2014. Springer … Conference on Applied …10 cites.
  432. Pseudonymous secure computation from time-lock puzzles“. J Katz, A Miller, E Shi. 2014. 10 cites.
  433. Towards an Agenda for Information Systems Research on Digital Currencies and Bitcoin“. GM Giaglis, KN Kypriotaki. 2014. Springer International Conference on Business …10 cites.
  434. Disrupting governance: The new institutional economics of distributed ledger technology“. S Davidson, P De Filippi, J Potts. 2016. 10 cites.
  435. What is bitcoin?“. D Hobson. 2013. XRDS: Crossroads, The ACM Magazine for Students10 cites.
  436. Publishing without publishers: a decentralized approach to dissemination, retrieval, and archiving of data“. T Kuhn, C Chichester, M Krauthammer…. 2015. Springer International Semantic …10 cites.
  437. 20 Professional domains: Writing as creation of economic value“. EM Jakobs, C Spinuzzi. 2014. Handbook of writing and text production10 cites.
  438. Privacy-aware architecture for sharing web histories“. A Tsow, C Viecco, LJ Camp. 2007. IBM Systems Journal10 cites.
  439. CPV: Delay-based location verification for the Internet“. AR Abdou, A Matrawy…. 2017. IEEE Transactions on …10 cites.
  440. Peer-to-peer security“. A Friedman, LJ Camp. 2005. The Handbook of Information …10 cites.
  441. mod kapow: Protecting the web with transparent proof-of-work“. E Kaiser, W Feng. 2008. INFOCOM Workshops 2008, IEEE9 cites.
  442. The hashcash proof-of-work function“. A Back. 2003. Draft-Hashcash-back-00, Internet-Draft Created,(Jun …9 cites.
  443. Worker’s compensation law and the compensability of mental injuries.“. KJ Merrikin, TD Overcast, BD Sales. 1982. Health Psychology9 cites.
  444. Issues in initializing security“. N Asokan, L Tarkkala. 2005. … , 2005. Proceedings of the Fifth IEEE …9 cites.
  445. Attribute-based Credentials for Trust“. K Rannenberg, J Camenisch, A Sabouri. 2015. Springer Identity in the Information …9 cites.
  446. How well can congestion pricing neutralize denial of service attacks?“. A Vulimiri, GA Agha, PB Godfrey…. 2012. ACM SIGMETRICS …9 cites.
  447. Introduction to the Special Issue on “Data management in vehicular networks”“. T Delot, S Ilarri. 2012. Pergamon 9 cites.
  448. Professional Certification: A Study of Significance.“. JM Ulmer. 2010. Journal of industrial technology9 cites.
  449. Retricoin: Bitcoin based on compact proofs of retrievability“. B Sengupta, S Bag, S Ruj, K Sakurai. 2016. Proceedings of the 17th …9 cites.
  450. Identity loan: The moral economy of migrant document exchange in California’s Central Valley“. S Horton. 2015. Wiley Online Library American Ethnologist9 cites.
  451. A p2p content authentication protocol based on byzantine agreement“. E Palomar, J Estevez-Tapiador…. 2006. Springer Emerging Trends in …9 cites.
  452. An analysis of the Bitcoin electronic cash system“. D Drainville. 2012. … Waterloo, ON, Canada, Canada, Tech. Rep9 cites.
  453. Using rhythmic nonces for puzzle-based dos resistance“. EM Chan, CA Gunter, S Jahid, E Peryshkin…. 2008. Proceedings of the 2nd …9 cites.
  454. Blockstack: Design and implementation of a global naming system with blockchains“. M Ali, J Nelson, R Shea, MJ Freedman. 2016. Last visited on9 cites.
  455. Bitcoin clients“. R Skudnov. 2012. 9 cites.
  456. The blockchain-based digital content distribution system“. J Kishigami, S Fujimura, H Watanabe…. 2015. Big Data and Cloud …9 cites.
  457. On trustworthiness of cpu usage metering and accounting“. M Liu, X Ding. 2010. … ), 2010 IEEE 30th International Conference on9 cites.
  458. Double Spending Protection for E-Cash Based on Risk Management.“. P Everaere, I Simplot-Ryl, I Traoré. 2010. Springer ISC9 cites.
  459. A Blockchain-Based Approach to Health Information Exchange Networks“. K Peterson, R Deeduvanu, P Kanjamala, K Boles. 2016. 9 cites.
  460. Increasing anonymity in Bitcoin“. A Saxena, J Misra, A Dhar. 2014. Springer … on Financial Cryptography and Data Security9 cites.
  461. On non-parallelizable deterministic client puzzle scheme with batch verification modes“. Q Tang, A Jeckmans. 2010. 9 cites.
  462. Blockchain platform for industrial Internet of Things“. A Bahga, VK Madisetti. 2016. J. Softw. Eng. Appl9 cites.
  463. A review of techniques to counter spam and spit“. A Nakulas, L Ekonomou, S Kourtesi, GP Fotis…. 2009. Springer Proceedings of the …9 cites.
  464. On the Security and Scalability of Bitcoin’s Blockchain“. G Karame. 2016. Proceedings of the 2016 ACM SIGSAC Conference on …9 cites.
  465. A PRELIMINARY REPORT ON THE SO‐CALLED “BANNERSTONES”“. JL Baer. 1921. Wiley Online Library American Anthropologist9 cites.
  466. The blockchain phenomenon“. J Mattila. 2016. … The Blockchain Phenomenon'(Berkeley Roundtable of …9 cites.
  467. A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology“. J Herbert, A Litchfield. 2015. Proceedings of the 38th …9 cites.
  468. Bitcoin‐Based Decentralized Carbon Emissions Trading Infrastructure Model“. E Al Kawasmi, E Arnautovic…. 2015. Wiley Online Library Systems …9 cites.
  469. Scripting smart contracts for distributed ledger technology.“. PL Seijas, SJ Thompson…. 2016. IACR Cryptology ePrint …9 cites.
  470. Towards a novel privacy-preserving access control model based on blockchain technology in IoT“. A Ouaddah, AA Elkalam, AA Ouahman. 2017. Springer Europe and MENA Cooperation …9 cites.
  471. Offline submission with rsa time-lock puzzles“. YI Jerschow, M Mauve. 2010. Computer and Information Technology …9 cites.
  472. Verification methods and apparatus for use in providing application services to mobile communication devices“. A Sherkin, WD Franco. 2013. Google Patents US Patent 8,386,7739 cites.
  473. Depth-robust graphs and their cumulative memory complexity“. J Alwen, J Blocki, K Pietrzak. 2017. Springer … International Conference on the Theory and …9 cites.
  474. An Empirical Study of Textual Key-Fingerprint Representations.“. S Dechand, D Schürmann, K Busse, Y Acar…. 2016. USENIX Security …9 cites.
  475. 一种认证协议防御拒绝服务攻击的设计方法“. 卫剑钒, 陈钟, 段云所, 王立福. 2005. 电子学报9 cites.
  476. Distributed consensus from proof of stake is impossible“. A Poelstra. 2014. 8 cites.
  477. A Provably Secure Proof-of-Stake Blockchain Protocol.“. A Kiayias, I Konstantinou, A Russell, B David…. 2016. IACR Cryptology …8 cites.
  478. The economics of information security and privacy“. R Böhme. 2013. Springer 8 cites.
  479. Bitdeposit: Deterring attacks and abuses of cloud computing services through economic measures“. J Szefer, RB Lee. 2013. Cluster, Cloud and Grid Computing (CCGrid) …8 cites.
  480. Installation of an Application Module and a Temporary Certificate“. SK Agrawal, T Foucher, WO Pereira…. 2006. Google Patents US Patent App. 11 …8 cites.
  481. Interest cash: an application-based countermeasure against interest flooding for dynamic content in named data networking“. Z Li, J Bi. 2014. Proceedings of The Ninth International Conference on …8 cites.
  482. Feedback based Reputation on top of the Bitcoin Blockchain“. D Carboni. 2015. arXiv preprint arXiv:1502.015048 cites.
  483. Tailored security: Building nonrepudiable security service-level agreements“. T Takahashi, J Kannisto, J Harju…. 2013. IEEE Vehicular …8 cites.
  484. The case for network witnesses“. W Feng, T Schluessler. 2008. … , 2008. NPSec 2008. 4th Workshop on8 cites.
  485. ZombieCoin: powering next-generation botnets with bitcoin“. ST Ali, P McCorry, PHJ Lee, F Hao. 2015. Springer International Conference on Financial …8 cites.
  486. The bitcoin backbone protocol with chains of variable difficulty“. J Garay, A Kiayias, N Leonardos. 2017. Springer Annual International Cryptology …8 cites.
  487. Strengthening password-based authentication protocols against online dictionary attacks“. P Wang, Y Kim, V Kher, T Kwon. 2005. Springer International Conference on Applied …8 cites.
  488. A tale of twin tech: Bitcoin and the www“. D Folkinshteyn, MM Lennon, T Reilly. 2015. 8 cites.
  489. A survey of mitigation techniques against Economic Denial of Sustainability (EDoS) attack on cloud computing architecture“. P Singh, S Manickam…. 2014. … , Infocom Technologies and …8 cites.
  490. Useful password hashing: how to waste computing cycles with style“. M Dürmuth. 2013. Proceedings of the 2013 workshop on New security …8 cites.
  491. The lone parents pilots: a qualitative evaluation of quarterly work focused interviews (12+), work search premium and in work credit“. K Ray, S Vegeris, S Brooks, V Campbell-Barr…. 2007. 8 cites.
  492. How to vote privately using bitcoin“. Z Zhao, THH Chan. 2015. Springer International Conference on Information and …8 cites.
  493. The Revolution will (not) be Decentralized: Blockchains“. R O’Dwyer. 2015. Commons Transition8 cites.
  494. Digitalisation in payments: From interoperability to centralised models?“. U Milkau, J Bott. 2015. Journal of Payments Strategy & Systems8 cites.
  495. Bitcoin and modern alchemy: in code we trust“. J Simser. 2015. Journal of Financial Crime8 cites.
  496. Denial of Service Elusion (DoSE): Keeping clients connected for less“. P Wood, C Gutierrez, S Bagchi. 2015. Reliable Distributed Systems …8 cites.
  497. Strategies and heuristics for novice instructional designers as they work with faculty content experts in a university setting“. M Liu, C Kishi, S Rhodes. 2007. … design: Case studies in communities of …8 cites.
  498. Further applications of the blockchain“. G Foroglou, AL Tsilidou. 2015. 12th Student Conference on Managerial …8 cites.
  499. Reconciliation and Conciliation: The Irreconcilable Dilemma of the 1965’Equal’Wage Case for Aboriginal Station Workers“. T Anthony. 2007. JSTOR Labour History8 cites.
  500. A faster Bitcoin network“. C Stathakopoulou, C Decker…. 2015. Tech. rep., ETH, Zurich …8 cites.
  501. Protocol engineering for protection against Denial-of-Service attacks“. S Tritilanunt. 2009. 8 cites.
  502. Cryptocash, cryptocurrencies, and cryptocontracts“. N Koblitz, AJ Menezes. 2016. Springer Designs, Codes and Cryptography8 cites.
  503. Optimal Hackback“. JP Kesan, R Majuca. 2009. HeinOnline Chi.-Kent L. Rev.8 cites.
  504. Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption.“. A Lysyanskaya, A Segal. 2010. IACR Cryptology ePrint Archive8 cites.
  505. Economic Analysis of Cryptocurrency Backed Money Laundering.“. C Brenig, R Accorsi, G Müller. 2015. ECIS8 cites.
  506. Standing on the Shoulders of Giants: Are ERP success factors relevant for EDRMS Implementation?“. TL Nguyen, P Swatman, B Fraunholz. 2008. BLED 2008 Proceedings8 cites.
  507. Blockchain application and outlook in the banking industry“. Y Guo, C Liang. 2016. Springer Financial Innovation8 cites.
  508. Social trust of virtual identities“. JM Seigneur. 2009. Springer Computing with Social Trust8 cites.
  509. Blockchain-based secure firmware update for embedded devices in an Internet of Things environment“. B Lee, JH Lee. 2017. Springer The Journal of Supercomputing8 cites.
  510. An empirical analysis of smart contracts: platforms, applications, and design patterns“. M Bartoletti, L Pompianu. 2017. arXiv preprint arXiv:1703.063228 cites.
  511. Helping ticketmaster: Changing the economics of ticket robots with geographic proof-of-work“. E Kaiser, W Feng. 2010. INFOCOM IEEE Conference on Computer …7 cites.
  512. Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin“. M Bastiaan. 2015. … -of-two-phase-proof-of-work-in-bitcoin. pdf7 cites.
  513. Countermeasures against sybil attacks in wsn based on proofs-of-work“. M Klonowski, MB Koza. 2013. Proceedings of the sixth ACM conference on …7 cites.
  514. Proof of stake velocity: Building the social currency of the digital age“. L Ren. 2014. Self-published white paper7 cites.
  515. Blockchain Technology: What is it good for?“. SH Ammous. 2016. Browser Download This Paper7 cites.
  516. Spam, phishing, and the looming challenge of big botnets“. R Hemmingsen, J Aycock, M Jacobson Jr. 2007. 7 cites.
  517. Addressing Security issues in Cloud Computing“. R Dubey, MA Jamshed, X Wang, RK Batalla. 0. Technical Report, Carnegie Mellon …7 cites.
  518. In blocks [security bitcoin]“. D Bradbury. 2015. Engineering & Technology7 cites.
  519. Business Data Communications and Networking: A Research Perspective: A Research Perspective“. J Gutierrez. 2006. 7 cites.
  520. Towards reference architecture for cryptocurrencies: Bitcoin architectural analysis“. I Alqassem, D Svetinovic. 2014. … IEEE and Cyber, Physical and Social …7 cites.
  521. Trend of centralization in Bitcoin’s distributed network“. A Beikverdi, JS Song. 2015. Software Engineering, Artificial …7 cites.
  522. Work experience in PAIS–concepts, measurements and potentials“. S Kabicher-Fuchs, S Rinderle-Ma. 2012. Springer Advanced Information Systems …7 cites.
  523. P2P economies“. E Peserico. 2006. Proceedings of the ACM Special Interest …7 cites.
  524. An analysis of the cryptocurrency industry“. R Farell. 2015. 7 cites.
  525. Rational zero: Economic security for zerocoin with everlasting anonymity“. C Garman, M Green, I Miers, AD Rubin. 2014. Springer International Conference on …7 cites.
  526. Purely P2P crypto-currency with finite mini-blockchain“. JD Bruce. 2013. 7 cites.
  527. Identification and control of work-related diseases: report of a WHO expert committee [meeting held in Geneva from 28 November to 2 December 1983]“. World Health Organization. 1985. 7 cites.
  528. Blockchain Double Bubble or Double Trouble?“. J Umeh. 2016. ITNOW7 cites.
  529. Contribution to the study of multiple-valued bent functions“. C Moraga, M Stankovic, RS Stankovic…. 2013. Multiple-Valued Logic …7 cites.
  530. Identifying and Characterizing Sybils in the Tor Network.“. P Winter, R Ensafi, K Loesing, N Feamster. 2016. USENIX Security …7 cites.
  531. Overview of business innovations and research opportunities in blockchain and introduction to the special issue“. JL Zhao, S Fan, J Yan. 2016. Financial Innovation7 cites.
  532. Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.“. B Groza, B Warinschi. 2012. Springer ISC7 cites.
  533. Sybil-resistant pseudonymization and pseudonym change without trusted third parties“. M Florian, J Walter, I Baumgart. 2015. Proceedings of the 14th ACM Workshop …7 cites.
  534. Cost-based and time-based analysis of DoS-resistance in HIP“. S Tritilanunt, C Boyd, E Foo, JMG Nieto. 2007. Proceedings of the thirtieth …7 cites.
  535. An Analysis of Bitcoin Exchange Rates“. JB Smith. 2016. Browser Download This Paper7 cites.
  536. HTTPreject: handling overload situations without losing the contact to the user“. J Schneider, S Koch. 2010. Computer Network Defense (EC2ND) …7 cites.
  537. Making contribution-aware p2p systems robust to collusion attacks using bandwidth puzzles“. MK Reiter, V Sekar, Z Zhang. 2008. … Report CMU-CS …7 cites.
  538. Darkcoin: PeertoPeer CryptoCurrency with Anonymous Blockchain Transactions and an Improved ProofofWork System“. E Duffield, K Hagan. 2014. Mar-2014 [Online]. Available: https …7 cites.
  539. On the Memory-Hardness of Data-Independent Password-Hashing Functions.“. J Alwen, P Gazi, C Kamath, K Klein…. 2016. IACR Cryptology …7 cites.
  540. New kids on the block: an analysis of modern blockchains“. L Anderson, R Holz, A Ponomarev, P Rimba…. 2016. arXiv preprint arXiv …7 cites.
  541. The merits of a meritocracy in open source software ecosystems“. E Eckhardt, E Kaats, S Jansen, C Alves. 2014. Proceedings of the 2014 …7 cites.
  542. Blockchain temporality: smart contract time specifiability with blocktime“. M Swan. 2016. Springer International symposium on rules and rule markup …7 cites.
  543. Blockchain in internet of things: challenges and solutions“. A Dorri, SS Kanhere, R Jurdak. 2016. arXiv preprint arXiv:1608.051877 cites.
  544. Exploring miner evolution in bitcoin network“. L Wang, Y Liu. 2015. Springer International Conference on Passive and Active …7 cites.
  545. Redactable blockchain–or–rewriting history in bitcoin and friends“. G Ateniese, B Magri, D Venturi…. 2017. Security and Privacy …7 cites.
  546. Can we make email secure?“. D Bradbury. 2014. Elsevier Network Security7 cites.
  547. A Case Study for Blockchain in Healthcare:“MedRec” prototype for electronic health records and medical research data“. A Ekblaw, A Azaria, JD Halamka…. 2016. … of IEEE Open & Big Data …7 cites.
  548. Transparency overlays and applications“. M Chase, S Meiklejohn. 2016. Proceedings of the 2016 ACM SIGSAC …7 cites.
  549. Refund attacks on Bitcoin’s Payment Protocol“. P McCorry, SF Shahandashti, F Hao. 2016. Springer International Conference on …7 cites.
  550. Dynamic common law and technological change: the classification of Bitcoin“. S Bayern. 2014. HeinOnline Wash. & Lee L. Rev. Online7 cites.
  551. Introduction to bitcoin“. LP Nian, DLK Chuen. 2015. Handbook of Digital Currency: Bitcoin …7 cites.
  552. Preventing spam in publish/subscribe“. S Tarkoma. 2006. … Workshops, 2006. ICDCS Workshops 2006. 26th …7 cites.
  553. AnonRep: Towards Tracking-Resistant Anonymous Reputation.“. E Zhai, DI Wolinsky, R Chen, E Syta, C Teng, B Ford. 2016. NSDI7 cites.
  554. The invisible politics of bitcoin: governance crisis of a decentralized infrastructure“. P De Filippi, B Loveluck. 2016. 7 cites.
  555. Low-Back Pain Disorders as Occupational Diseases in the Czech Republic and 22 European Countries: Comparison of National Systems, Related Diagnoses and …“. A Lastovková, M Nakládalová…. 2015. … European journal of …7 cites.
  556. Emergence of FinTech and the LASIC principles“. DKC Lee, EGS Teo. 2015. 7 cites.
  557. Can’t Buy Me Love: Funding Marriage Promotion Versus Listening to Real Needs in Breaking the Cycle of Poverty“. A Parker. 2008. HeinOnline S. Cal. Rev. L. & Soc. Just.7 cites.
  558. Can’t Buy Me Love: Funding Marriage Promotion Versus Listening to Real Needs in Breaking the Cycle of Poverty“. A Parker. 2008. HeinOnline S. Cal. Rev. L. & Soc. Just.7 cites.
  559. Security for medical sensor networks in mobile health systems“. I Nikolaevskiy, D Korzun…. 2014. World of Wireless, Mobile …7 cites.
  560. Free-riding prevention in super-peer desktop grids“. P Merz, F Kolter, M Priebe. 2008. Computing in the Global …7 cites.
  561. Congestion games with multisets of resources and applications in synthesis“. G Avni, O Kupferman, T Tamir. 2015. LIPIcs-Leibniz International …7 cites.
  562. Российский туризм в «новой реальности»: постановка проблемы“. ЕА Джанджугазова. 2015. Российские регионы: взгляд в будущее7 cites.
  563. О подходах в международном регулировании криптовалют (Bitcoin) в отдельных иностранных юрисдикциях“. ВА Кузнецов, АВ Якубов. 2016. Деньги и кредит7 cites.
  564. Cuckoo Cycle: a memory bound graph-theoretic proof-of-work“. J Tromp. 2015. Springer … Conference on Financial Cryptography and Data …6 cites.
  565. Overcoming reputation and proof-of-work systems in botnets“. A White, A Tickle, A Clark. 2010. Network and System Security (NSS) …6 cites.
  566. Lazy Susan: dumb waiting as proof of work“. J Crowcroft, T Deegan, C Kreibich, R Mortier, N Weaver. 2007. 6 cites.
  567. Proof of Luck: An efficient Blockchain consensus protocol“. M Milutinovic, W He, H Wu, M Kanwal. 2016. … of the 1st Workshop on System …6 cites.
  568. Identifying Legitimate Clients under Distributed Denial-of-Service Attacks“. S Simpson, AT Lindsay…. 2010. Network and System …6 cites.
  569. Blockchain for the Internet of Things: A systematic literature review“. M Conoscenti, A Vetrò, JC De Martin. 2016. 6 cites.
  570. Understanding work disability systems and intervening upstream“. E MacEachen. 2013. Springer Handbook of work disability6 cites.
  571. Blind signatures for bitcoin transaction anonymity“. W Ladd. 2012. 6 cites.
  572. Proofs of Space-Time and Rational Proofs of Storage.“. T Moran, I Orlov. 2016. IACR Cryptology ePrint Archive6 cites.
  573. Extending existing blockchains with virtualchain“. J Nelson, M Ali, R Shea…. 2016. Workshop on Distributed …6 cites.
  574. Work Value“. JR Kerr. 1964. Journal of Industrial Relations6 cites.
  575. CAD-coin versus Fedcoin“. R Garratt. 2016. R3 Report6 cites.
  576. Work “Only a Woman Can DO”: The Women’s Division of the Canadian Department of Immigration and Colonization, 1920–1937“. R Mancuso. 2005. Taylor & Francis American Review of Canadian Studies6 cites.
  577. Understanding Bitcoins: facts and questions“. BS Albuquerque, MC Callado. 2015. SciELO Brasil Revista Brasileira de Economia6 cites.
  578. There are two sides to every coin—even to the bitcoin, a virtual currency“. MA Arias, Y Shin. 2013. The Regional Economist6 cites.
  579. Quantum bitcoin: An anonymous and distributed currency secured by the no-cloning theorem of quantum mechanics“. J Jogenfors. 2016. arXiv preprint arXiv:1604.013836 cites.
  580. Binary tree based public-key management for mobile ad hoc networks“. G Kambourakis, E Konstantinou…. 2008. … Systems. 2008. ISWCS’ …6 cites.
  581. OnionDNS: A seizure-resistant top-level domain“. N Scaife, H Carter, P Traynor. 2015. Communications and Network …6 cites.
  582. 32. Accounting in Peer-to-Peer-Systems“. NC Liebau, V Darlagiannis, O Heckmann…. 2005. Springer Peer-to-Peer Systems …6 cites.
  583. A biologically inspired method of spam detection“. P Gardner-Stephen. 2009. … Systems Application, 2009. DEXA’09. 20th …6 cites.
  584. A Survey of anonymous blacklisting systems“. R Henry, I Goldberg. 2010. University of Waterloo, Centre for …6 cites.
  585. Financial Cryptography and Data Security“. J Clark, A Essex. 2016. Springer 6 cites.
  586. Safety analysis of Bitcoin improvement proposals“. E Anceaume, T Lajoie-Mazenc…. 2016. … (NCA), 2016 IEEE …6 cites.
  587. Pressure from the inside: The subnational politics of immigration“. Á García, K Griesbach, J Andrade…. 2011. … , Rafael Alarcón y …6 cites.
  588. The community behavior of spammers“. F Li, H Mo-Han, G Pawel. 2011. 6 cites.
  589. Bitcoin mining technology“. ND Bhaskar, DLEEK Chuen. 2015. Handbook of Digital Currency …6 cites.
  590. Secure communication via shared knowledge and a salted hash in ad-hoc environments“. AD Kent, LM Liebrock. 2011. Computer Software and Applications …6 cites.
  591. Bitcoin covenants“. M Möser, I Eyal, EG Sirer. 2016. Springer … on Financial Cryptography and Data Security6 cites.
  592. Validation of application behavior on a virtual time integrated network emulation testbed“. Y Zheng, D Jin, DM Nicol. 2012. Proceedings of the Winter Simulation …6 cites.
  593. Blockchain-based architectures for the internet of things: a survey“. M Atzori. 2016. 6 cites.
  594. Cryptocurrencies as distributed community experiments“. M Tarasiewicz, A Newman. 2015. Handbook of digital currency6 cites.
  595. The economics of the bitcoin system“. GH Popescu. 2014. Psychosociological Issues in Human Resource …6 cites.
  596. Could bitcoin be a financial solution for developing economies“. AG Clegg. 2014. University of Birmingham6 cites.
  597. Algorand: Scaling byzantine agreements for cryptocurrencies“. Y Gilad, R Hemo, S Micali, G Vlachos…. 2017. In Proceedings of the …6 cites.
  598. Challenges and opportunities associated with a bitcoin-based transaction rating system“. D Vandervort. 2014. Springer … Conference on Financial Cryptography and Data …6 cites.
  599. Using network traffic to infer hardware state: A kernel-level investigation“. L Watkins, WH Robinson, R Beyah. 2015. ACM Transactions on Embedded …6 cites.
  600. Throttling DDoS attacks using discrete logarithm problem“. A Darapureddi, R Mohandas…. 2010. … ), Proceedings of the …6 cites.
  601. System and methods for protecting against denial of service attacks“. WC Feng. 2012. Google Patents US Patent 8,171,5626 cites.
  602. Distributing trusted third parties“. A Küpçü. 2013. ACM SIGACT News6 cites.
  603. Dependable connection setup for network capabilities“. SB Lee, VD Gligor, A Perrig. 2010. Dependable Systems and …6 cites.
  604. Balloon hashing: A memory-hard function providing provable protection against sequential attacks“. D Boneh, H Corrigan-Gibbs, S Schechter. 2016. Springer International Conference on …6 cites.
  605. Explicit optimal binary pebbling for one-way hash chain reversal“. B Schoenmakers. 2016. Springer … Conference on Financial Cryptography and Data …6 cites.
  606. Market design for trading with blockchain technology“. K Malinova, A Park. 2016. Unpublished manuscript, University of …6 cites.
  607. Modeling and Simulation of the Economics of Mining in the Bitcoin Market“. L Cocco, M Marchesi. 2016. PloS one6 cites.
  608. Immigration Reform Fuels Employment Discrimination“. N Prescott. 2006. HeinOnline Drake L. Rev.6 cites.
  609. Beyond Bitcoin-Part I: A critical look at blockchain-based systems.“. P Forte, D Romano, G Schmid. 2015. IACR Cryptology ePrint Archive6 cites.
  610. Privacy in bitcoin transactions: new challenges from blockchain scalability solutions“. J Herrera-Joancomartí, C Pérez-Solà. 2016. Springer Modeling Decisions for Artificial …6 cites.
  611. The sleepy model of consensus“. R Pass, E Shi. 2016. 6 cites.
  612. 6lowdtn: Ipv6-enabled delay-tolerant wsns for contiki“. L Bruno, M Franceschinis, C Pastrone…. 2011. … Computing in Sensor …6 cites.
  613. John MacCulloch, blackguard, thief and high priest, reassessed“. DA Cumming. 1985. Archives of Natural History6 cites.
  614. The memory-hard Argon2 password hash and proof-of-work function“. A Biryukov, D Dinu, D Khovratovich…. 2016. Internet-Draft draft-irtf-cfrg-argon2-00 … 5 cites.
  615. Primecoin: Cryptocurrency with prime number proof-of-work, July 2013“. S King. 2013. URL https://www. primecoin. org/static/primecoin-paper …5 cites.
  616. Primecoin: cryptocurrency with prime number proof-of-work (2013)“. S King. 2013. . 5 cites.
  617. Bitcoin Message: Data Insertion on a Proof-of-Work Cryptocurrency System“. MD Sleiman, AP Lauf…. 2015. Cyberworlds (CW), 2015 …5 cites.
  618. Some preliminary findings on the meaning of work in Ghana: A research note“. BB Puplampu. 1997. IFE PsychologIA: An International Journal5 cites.
  619. Healthcare transaction validation via blockchain proof-of-work, systems and methods“. NJ Witchey. 2015. Google Patents US Patent App. 14/711,7405 cites.
  620. The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example“. C Natoli, V Gramoli. 2016. arXiv preprint arXiv:1612.094265 cites.
  621. 2-hop blockchain: Combining proof-of-work and proof-of-stake securely“. T Duong, L Fan, HS Zhou. 2016. 5 cites.
  622. Proof of space from stacked expanders“. L Ren, S Devadas. 2016. Springer Theory of Cryptography Conference5 cites.
  623. Bitcoin & Gresham’s Law-the economic inevitability of Collapse“. P Güring, I Grigg. 2011. October–December. http://iang. org …5 cites.
  624. On the danger of private blockchains“. V Gramoli. 2016. … Cryptocurrencies and Consensus Ledgers (DCCL’16)5 cites.
  625. Mitigation of economic distributed denial of sustainability (eddos) in cloud computing“. MN Kumar, R Korra, P Sujatha…. 2011. In Proc. of the Intl’Conf. on …5 cites.
  626. “A treatise on altcoins“. A Poelstra. 2014. 5 cites.
  627. Bayesian analysis of secure P2P sharing protocols“. E Palomar, A Alcaide, JM Estevez-Tapiador…. 2007. Springer … Conferences” On the …5 cites.
  628. Bitcoin Protocol: Model of ‘Cryptographic Proof’Based Global Crypto-Currency & Electronic Payments System“. Y Malhotra. 2013. 5 cites.
  629. SECURIST: Co-ordinating the development of a Strategic Research Agenda for Security and Dependability R&D“. JJ Clarke, WM Fitzgerald. 2005. … , 2005. CCST’05. 39th Annual 2005 …5 cites.
  630. Compensation for Work-Related Illness in Arkansas“. RB Leflar. 1988. HeinOnline Ark. L. Rev.5 cites.
  631. Latency-hiding work stealing: Scheduling interacting parallel computations with work stealing“. SK Muller, UA Acar. 2016. Proceedings of the 28th ACM Symposium on …5 cites.
  632. Oblivious printing of secret messages in a multi-party setting“. A Essex, U Hengartner. 2012. Springer … Conference on Financial Cryptography and Data …5 cites.
  633. Trustworthy routing with the TORA protocol“. AA Pirzada, A Datta, C McDonald. 2004. Proceedings of the AusCERT …5 cites.
  634. Is Bitcoin the “Paris Hilton” of the Currency World? Or Are the Early Investors onto Something That Will Make Them Rich?“. A Chowdhury. 2016. The Journal of Investing5 cites.
  635. Appraisal of the Most Prominent Attacks due to vulnerabilities in cloud computing“. M Shah, AS Shah. 2016. International Journal of Grid and Distributed …5 cites.
  636. The Bitcoin Protocol as Law, and the Politics of a Stateless Currency“. S Jeong. 2013. Browser Download This Paper5 cites.
  637. Employers on the Fence: A Guide to the Immigratory Workplace“. N Prescott. 2006. HeinOnline Campbell L. Rev.5 cites.
  638. On the correlation intractability of obfuscated pseudorandom functions“. R Canetti, Y Chen, L Reyzin. 2016. Springer Theory of Cryptography Conference5 cites.
  639. Lightweight protection of group content distribution“. P Szalachowski, A Perrig. 2015. Proceedings of the 1st ACM Workshop on IoT …5 cites.
  640. Dak roads, dak runners, and the reordering of communication networks“. C Joshi. 2012. International Review of Social History5 cites.
  641. Pseudonymous broadcast and secure computation from cryptographic puzzles“. J Katz, A Miller, E Shi. 0. allquantor.at5 cites.
  642. Secure Incentive-Based Architecture for Vehicular Cloud“. K Lim, IM Abumuhfouz, D Manivannan. 2015. Springer International Conference on Ad …5 cites.
  643. Centmail: Rate limiting via certified micro-donations“. S Goel, J Hofman, J Langford, DM Pennock…. 2009. Proceedings of …5 cites.
  644. Confluence of the economic recession and immigration laws in the lives of Latino immigrant workers in the United States“. C Menjívar, ME Enchautegui. 2015. Springer Immigrant Vulnerability and Resilience5 cites.
  645. Protecting Tor from botnet abuse in the long term“. N Hopper. 2013. 5 cites.
  646. Cross-country analysis of spambots“. V Garg, T Koster, LJ Camp. 2013. Springer EURASIP Journal on Information Security5 cites.
  647. Bitcoin-The Political’Virtual’of an Intangible Material Currency.“. MA Jansen. 2012. 5 cites.
  648. The No-Match Letter Rule: A Mismatch between the Department of Homeland Security and Social Security Administration in Worksite Immigration Law Enforcement“. M Gibek, J Shteierman. 2007. HeinOnline Hofstra Lab. & Emp. LJ5 cites.
  649. Bypassing network flooding attacks using fastpass“. D Wendlant, DG Andersen, A Perrig. 2006. 5 cites.
  650. Accelerating bitcoin’s transaction processing“. Y Sompolinsky, A Zohar. 2013. Fast Money Grows on Trees, Not Chains5 cites.
  651. Ring confidential transactions“. S Noether, A Mackenzie. 2016. Ledger5 cites.
  652. Decentralized Large-Scale Electricity Consumption Shifting by Prosumer Cooperatives.“. C Akasiadis, G Chalkiadakis. 2016. ECAI5 cites.
  653. The influence of maternal health literacy and child’s age on participation in social welfare programs“. S Pati, E Siewert, AT Wong, SK Bhatt…. 2014. Springer Maternal and child …5 cites.
  654. Overview of e-mail SPAM elimination and its efficiency“. T Sochor. 2014. Research Challenges in Information Science (RCIS) …5 cites.
  655. Can predictive computation reach the level of anticipatory computing“. M Nadin. 2014. Int. J. Appl. Res. Inf. Technol. Comput5 cites.
  656. The Sleepy Model of Consensus.“. I Bentov, R Pass, E Shi. 2016. IACR Cryptology ePrint Archive5 cites.
  657. Higher education and graduate employment: the importance of occupational specificity in Germany and Britain“. K Leuze. 2011. Converging worlds of welfare5 cites.
  658. A critical discourse analysis of the malaysian smart schools (mss) conceptual blueprint and implications to implementation“. L Kean-Wah, TS Ming. 2010. … Journal of Language Society, Society and …5 cites.
  659. The origin, classification and utility of Bitcoin“. P Šurda. 2014. 5 cites.
  660. The use of block chain technology in different application domains“. JS Czepluch, NZ Lollike, SO Malone. 2015. The IT University of Copenhagen …5 cites.
  661. Cryptocurrencies and bitcoin: Charting the research landscape“. M Morisse. 2015. 5 cites.
  662. Ring SIgnature Confidential Transactions for Monero.“. S Noether. 2015. IACR Cryptology ePrint Archive5 cites.
  663. Bitcoin block withholding attack: Analysis and mitigation“. S Bag, S Ruj, K Sakurai. 2017. IEEE Transactions on Information …5 cites.
  664. Music on the blockchain“. M O’Dair, Z Beaven, D Neilson, R Osborne, P Pacifico. 2016. 5 cites.
  665. Rep on the block: A next generation reputation system based on the blockchain“. R Dennis, G Owen. 2015. Internet Technology and Secured …5 cites.
  666. The Efficient Dual Receiver Cryptosystem and Its Applications.“. T Diament, HK Lee, AD Keromytis, M Yung. 2011. IJ Network Security5 cites.
  667. Cryptocurrency value formation: an empirical analysis leading to a cost of production model for valuing bitcoin“. A Hayes. 2016. 5 cites.
  668. A Taxonomy of Blockchain-Based Systems for Architecture Design“. X Xu, I Weber, M Staples, L Zhu, J Bosch…. 2017. … (ICSA), 2017 IEEE …5 cites.
  669. Privacy-awareness in blockchain-based PKI“. L Axon. 2015. 5 cites.
  670. Medical Record System Using Blockchain, Big Data and Tokenization“. PTS Liu. 2016. Springer Information and Communications Security5 cites.
  671. Fraud detections for online businesses: a perspective from blockchain technology“. Y Cai, D Zhu. 2016. Springer Financial Innovation5 cites.
  672. Improving the efficiency of spam filtering through cache architecture“. A Khanal, BS Motlagh, T Kocak. 2007. Modeling, Analysis, and …5 cites.
  673. Workers’ Compensation for Disease in Virginia: The Exception Swallows the Rule“. EV Scott. 1985. HeinOnline U. Rich. L. Rev.5 cites.
  674. Distributed immutabilization of secure logs“. J Cucurull, J Puiggalí. 2016. Springer International Workshop on Security and Trust …5 cites.
  675. Mitigating denial of service attack using proof of work and Token Bucket Algorithm“. AK Pandey, CP Rangan. 2011. Students’ Technology Symposium …4 cites.
  676. A novel proof of work model based on pattern matching to prevent DoS attack“. A Ordi, H Mousavi, B Shanmugam, MR Abbasy…. 2011. Springer … Conference on Digital …4 cites.
  677. Mitigating denial of service attack using proof of work and token bucket algorithm“. SKJ Chen, A Somani. 2011. Proceedings of the 2006 workshop on Dependability …4 cites.
  678. “the proof-of-work chain is a solution to the byzantine generals’ problem“. S Nakamoto. 2008. The Cryptography Mailing List, https://www. mailarchive …4 cites.
  679. Momentum–a memory-hard proof-of-work via finding birthday collisions, 2014“. D Lorimer. 2014. . 4 cites.
  680. Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies“. M Borge, E Kokoris-Kogias, P Jovanovic…. 2017. Security and Privacy …4 cites.
  681. Egalitarian computing“. ABD Khovratovich. 2015. 4 cites.
  682. TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake.“. A Chepurnoy, T Duong, L Fan, HS Zhou. 2017. IACR Cryptology ePrint …4 cites.
  683. Proofs of communication and its application for fighting spam“. M Klonowski, T Strumiński. 2008. Springer SOFSEM 2008: Theory and Practice of …4 cites.
  684. Proofs of Proofs of Work with Sublinear Complexity“. A Kiayias, N Lamprou, AP Stouka. 2016. Springer International Conference on Financial …4 cites.
  685. Model-based Security Engineering of SOA Systems Using Modified” UML-SOA-Sec”“. MQ Saleem, JB Jaafar…. 2012. The International Association for … Advances in …4 cites.
  686. International certification study: UK and Ireland“. J Stejskal. 2002. The ATA Chronicle, May4 cites.
  687. Proof of Space from Stacked Bipartite Graphs.“. L Ren, S Devadas. 2016. IACR Cryptology ePrint Archive4 cites.
  688. Cooperation in decentralised networks“. M Rogers, S Bhatti. 2005. London Communications Symposium …4 cites.
  689. Combating spam and denial-of-service attacks with trusted puzzle solvers“. P Tsang, S Smith. 2008. Springer Information Security Practice and Experience4 cites.
  690. Technical basis of digital currencies“. S Sprankel. 2013. 4 cites.
  691. A new proof-of-work mechanism for bitcoin“. N Shi. 2016. Financial Innovation4 cites.
  692. Formal verification of smart contracts“. K Bhargavan, A Delignat-Lavaud…. 2016. Proceedings of the …4 cites.
  693. Asian immigrant women fight domestic violence“. DL Jang. 1998. … lives: multicultural perspectives. Mountain View, CA …4 cites.
  694. The bitcoin transaction graph—anonymity“. MS Ortega. 2013. Master’ s thesis, Universitat Oberta de Catalunya4 cites.
  695. DEVELOPMENTS IN BANKING AND FINANCIAL LAW: 2013: XI. Bitcoin: The Legal Implications of a Novel Currency“. J Burleson. 2013. Rev. Banking & Fin. L.4 cites.
  696. Concerning charting“. M Busche. 1928. JSTOR The American Journal of Nursing4 cites.
  697. Reputation scoring system using an economic trust model: a distributed approach to evaluate trusted third parties on the internet“. M Vyshegorodtsev, D Miyamoto…. 2013. … (WAINA), 2013 27th …4 cites.
  698. Time-release Protocol from Bitcoin and Witness Encryption for SAT.“. J Liu, F Garcia, M Ryan. 2015. IACR Cryptology ePrint Archive4 cites.
  699. The effects of anti-spam methods on spam mail“. E Reshef, E Solan. 2006. 3rd Conference on Email and Anti …4 cites.
  700. A Framework for the Model Driven Development of Secure Web Services Composition“. MQ Saleem, JB Jaafar…. 2012. International Journal of …4 cites.
  701. Smart Contracts–Blockchains in the Wings“. T Bocek, B Stiller. 2018. Springer Digital Marketplaces Unleashed4 cites.
  702. Distributed Denial of Service-Defense Attack Tradeoff Analysis (DDOS-DATA)“. WJ Blackert, RL Hom, AK Castner, RM Jokerst…. 2004. 4 cites.
  703. The new architecture of P2P-botnet“. D Sun, X Li, W Liu, J Wu. 2010. Cybercrime and Trustworthy …4 cites.
  704. Colored coins: Bitcoin, blockchain, and land administration“. A Anand, M McKibbin, F Pichel. 2016. … World Bank Conference on Land and …4 cites.
  705. Issues in designing a Bitcoin-like community currency“. D Vandervort, D Gaucas, R St Jacques. 2015. Springer International Conference on …4 cites.
  706. CheR: Cheating resilience in the cloud via smart resource allocation“. F Lombardi, F Martinelli, D Sgandurra. 2014. Springer Foundations and Practice of …4 cites.
  707. Proofs of Useful Work.“. M Ball, A Rosen, M Sabin…. 2017. IACR Cryptology ePrint …4 cites.
  708. Multiple-use transferable e-cash“. P Sarkar. 2013. International journal of computer applications4 cites.
  709. Applicability of distributed ledger technology to capital market infrastructure“. A Santo, I Minowa, G Hosaka, S Hayakawa…. 2016. … Exchange Group, JPX …4 cites.
  710. Toward de-anonymizing bitcoin by mapping users location“. J Dupont, AC Squicciarini. 2015. Proceedings of the 5th ACM Conference on …4 cites.
  711. Authenticated key exchange over bitcoin“. P McCorry, SF Shahandashti, D Clarke…. 2015. Springer … Conference on Research …4 cites.
  712. The economics of distributed ledger technology for securities settlement“. E Benos, R Garratt, P Gurrola-Perez. 2017. 4 cites.
  713. Spam detection in social bookmarking websites“. M Poorgholami, M Jalali, S Rahati…. 2013. … and Service Science …4 cites.
  714. incentive-Centered design for security“. JK MacKie-Mason. 2009. IEEE Security & Privacy4 cites.
  715. Workplace Searches by Public Employers and the Fourth Amendment“. PR Koster. 2007. JSTOR The Urban Lawyer4 cites.
  716. Workers’ Compensation and Occupational Disease“. DB LaPlante, R Opp. 1982. HeinOnline Mont. L. Rev.4 cites.
  717. State of Housing Microfinance in Africa“. M Kihato. 2013. Centre for Affordable Housing Finance in Africa4 cites.
  718. A novel wlan client puzzle against dos attack based on pattern matching“. A Ordi, M Zamani, N Bashah Idris…. 2015. Mathematical …4 cites.
  719. Location verification on the internet: Towards enforcing location-aware access policies over internet clients“. ARM Abdou, A Matrawy…. 2014. … and Network Security …4 cites.
  720. ZeroBlock: Preventing Selfish Mining in Bitcoin.“. S Solat, M Potop-Butucaru. 2016. arXiv preprint arXiv …4 cites.
  721. Trail Building During Complex Search Tasks.“. S Franken, U Norbisrath. 2014. Mensch & Computer4 cites.
  722. Extractable witness encryption and timed-release encryption from bitcoin“. J Liu, SA Kakvi, B Warinschi. 2015. 4 cites.
  723. Public Verification of Private Effort.“. G Alberini, T Moran, A Rosen. 2015. TCC (2)4 cites.
  724. Bitcoin: Free Money Or Fraud?“. K Schurman. 2011. 4 cites.
  725. Digital Currencies and Distributed Ledgers“. V Morabito. 2016. Springer The Future of Digital Business Innovation4 cites.
  726. An Endorsement-based Mobile Payment System for a Disaster Area“. B Ojetunde, N Shibata, J Gao…. 2015. … Information Networking and …4 cites.
  727. Bringing secure Bitcoin transactions to your smartphone“. D Frey, MX Makkes, PL Roman, F Taïani…. 2016. Proceedings of the 15th …4 cites.
  728. Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World.“. M Chase, R Ostrovsky, I Visconti. 2015. EUROCRYPT (2)4 cites.
  729. Automation and disruption in stolen payment card markets“. T Peacock, A Friedman. 2010. Criminal Justice Studies4 cites.
  730. Economic denial of sustainability mitigation in cloud computing“. M Ficco, M Rak. 2016. Springer Organizational Innovation and Change4 cites.
  731. Bitcoin risk analysis“. M Kiran, M Stanett. 2015. NEMODE Policy Paper4 cites.
  732. High-performance capabilities for 1-hop containment of network attacks“. T Wolf, S Natarajan, KT Vasudevan. 2013. IEEE/ACM Transactions on …4 cites.
  733. SOK: Making sense of censorship resistance systems“. S Khattak, T Elahi, L Simon, CM Swanson…. 2016. … on Privacy Enhancing …4 cites.
  734. Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks“. ZA Baig, SM Sait, F Binbeshr. 2016. Elsevier Computer Networks4 cites.
  735. A Secure, Efficient, and Transparent Network Architecture for Bitcoin“. AP Ozisik, G Andresen, GD Bissias, A Houmansadr…. 2016. 4 cites.
  736. Smart Contracts Make Bitcoin Mining Pools Vulnerable.“. Y Velner, J Teutsch, L Luu. 2017. IACR Cryptology ePrint Archive4 cites.
  737. Fair overload handling using proof-of-work functions“. S Golze, G Muhl. 2006. Applications and the Internet, 2006. SAINT …3 cites.
  738. ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.“. S Biedermann, NP Karvelas, S Katzenbeisser, T Strufe…. 2014. Springer SOFSEM3 cites.
  739. Proof-of-Work” proves not to work; version 0.2, Sept. 2004“. B Laurie, R Clayton. 0. . 3 cites.
  740. Antispam Systems Using Proof of Work Postage Stamps and Digital Signatures“. E Johanssen. 2001. Sep 3 cites.
  741. Cryptocurrencies without Proof of Work (2014)“. I Bentov, A Gabizon, A Mizrahi. 2014. arXiv preprint arXiv:1406.56943 cites.
  742. Bitcoin“. S Nakamoto. 2008. A Peer-to-Peer Electronic Cash System3 cites.
  743. A System for Distributed Minting and Management of Persistent Identifiers“. Ł Bolikowski, A Nowiński, W Sylwestrzak. 2015. International Journal of Digital …3 cites.
  744. An efficient distributed currency“. B Laurie. 2011. Practice3 cites.
  745. Bitcoin cooperative proof-of-stake“. SL Reed. 2014. arXiv preprint arXiv:1405.57413 cites.
  746. CSCL theories“. H Lin, R Pass. 1996. Citeseer 3 cites.
  747. DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.“. E Wustrow, B VanderSloot. 2016. WOOT3 cites.
  748. Solutions“. KHTSO Solid. 1987. Chemistry Letters3 cites.
  749. Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011 …“. H Cherifi, JM Zain, E El-Qawasmeh. 2011. 3 cites.
  750. Establishment of a trusted relationship between unknown communication parties“. L Tarkkala, N Asokan. 2012. Google Patents US Patent 8,132,0053 cites.
  751. The Bitcoin transaction system“. LA de la Porte. 2012. Utrecht, Netherlands3 cites.
  752. The Alaska Workers’ Compensation Law: Fact-Finding, Appellate Review, and the Presumption of Compensability“. A Larson, J Lewis. 1985. HeinOnline Alaska L. Rev.3 cites.
  753. NREGA: Challenges in implementation“. T Sood. 2006. InfoChange Features. http://www. infochangeindia. org …3 cites.
  754. Marker addresses: Adding identification information to Bitcoin transactions to leverage existing trust relationships.“. J Vornberger. 2012. GI-Jahrestagung3 cites.
  755. A Comparison of Trust Models.“. M Sel. 2015. Springer ISSE3 cites.
  756. Examining the DoS resistance of HIP“. S Tritilanunt, C Boyd, E Foo, JMG Nieto. 2006. Springer OTM Confederated International …3 cites.
  757. An architectural assessment of bitcoin: using the systems modeling language“. N Roth. 2015. Elsevier Procedia Computer Science3 cites.
  758. Inexpensive Email Addresses An Email Spam-Combating System.“. A Yegenian, T Dimitriou. 2010. Springer SecureComm3 cites.
  759. Judicial Review of Workmen’s Compensation Cases“. JT Haferman. 1975. HeinOnline Workmen’s Comp. L. Rev.3 cites.
  760. Model-based security engineering of SOA system using security intent DSL“. MQ Saleem, J Jaafar, MF Hassan. 2011. International Journal of New Computer …3 cites.
  761. Regularisation programmes in Greece“. A Levinson. 2005. 3 cites.
  762. Fawkescoin“. J Bonneau, A Miller. 2014. Springer Cambridge International Workshop on Security …3 cites.
  763. Money burning and implementation“. J Hartline, T Roughgarden. 2007. 3 cites.
  764. Making bitcoin exchanges transparent“. C Decker, J Guthrie, J Seidel, R Wattenhofer. 2015. Springer European Symposium on …3 cites.
  765. Re-traffic pricing for fighting against DDoS“. YY Shen, FQ Fan, WX Xie, LF Mo. 2008. … , Control, and Management …3 cites.
  766. Future of Bitcoin & Statistical Probabilistic Quantitative Methods: Global Financial Regulation (Interview: Hong Kong Institute of CPAs)“. Y Malhotra. 2014. Regulatory Compliance Report. 2014d. Global Risk …3 cites.
  767. New approach to mitigating distributed service flooding attacks“. M Abliz, T Znati. 2012. … of IARIA 7th International Conference on …3 cites.
  768. On the use of key assignment schemes in authentication protocols“. J Alderman, J Crampton. 2013. Springer … Conference on Network and System Security3 cites.
  769. Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions“. X Boyen, C Carr, T Haines. 2016. 3 cites.
  770. Covert Communication in VANETS using Internet Protocol Header Bit“. K Manchanda, A Singh. 2015. International Journal of Computer …3 cites.
  771. Bitcoin protocol specification“. K Okupski. 0. pdfs.semanticscholar.org3 cites.
  772. Tort Immunity Revisited: What Is the Present Test for Statutory Employer“. JM Church. 1993. HeinOnline La. L. Rev.3 cites.
  773. Progress Reports Improve Students’ Course Completion Rate and Achievement in Math Computer-Assisted Instruction.“. RB Clariana, LJ Smith. 1989. ERIC 3 cites.
  774. Crypto currencies: core information technology and information system fundamentals enabling currency without borders“. A Serapiglia, CP Serapiglia, J McIntyre. 2015. Information Systems Education …3 cites.
  775. Enclaves of Rights: Workplace Enforcement, Union Contracts, and the Uneven Regulatory Geography of Immigration Policy“. V Parks. 2014. Taylor & Francis Annals of the Association of American Geographers3 cites.
  776. Enhancement of Preventing Application Layer Based on DDOS Attacks by Using Hidden Semi-Markov Model“. KK Oo, KZ Ye, H Tun, KZ Lin, EM Portnov. 2016. Springer Genetic and Evolutionary …3 cites.
  777. Bitcoins: Made in China“. T Swanson. 2014. Bitcoin Magazine3 cites.
  778. Blockchains Consensus Protocols in the Wild“. C Cachin, M Vukolić. 2017. arXiv preprint arXiv:1707.018733 cites.
  779. Reinforcing Immutability of Permissioned Blockchains with Keyless Signatures’ Infrastructure“. N Emmadi, H Narumanchi. 2017. … of the 18th International Conference on …3 cites.
  780. Legitimizing Bitcoin: Policy Recommendations“. T Alcorn, A Eagle, E Sherbondy. 2014. 3 cites.
  781. Personalized PageRank solution paths“. K Kloster, DF Gleich. 2015. arXiv preprint arXiv:1503.003223 cites.
  782. Cryptographic approaches to denial-of-service resistance“. C Boyd, J Gonzalez-Nieto, L Kuppusamy…. 2011. Springer An Investigation into the …3 cites.
  783. Systems-compatible incentives“. D Levin, N Spring…. 2009. Game Theory for Networks …3 cites.
  784. Chain interoperability“. V Buterin. 2016. 3 cites.
  785. Training of pathologists in countries belonging to the European Economic Community.“. MG Rinsler. 1977. Journal of clinical pathology3 cites.
  786. Bitcoin and decentralized trust protocols“. R Pérez-Marco. 2016. arXiv preprint arXiv:1601.052543 cites.
  787. The EARWORM Password Hashing Algorithm“. D Franke. 2014. 3 cites.
  788. Banking on Bitcoin: Applying Anti-Money Laundering and Money Transmitter Laws“. KL Penrose. 2013. HeinOnline NC Banking Inst.3 cites.
  789. NeTS—FIND: Enabling Defense and Deterrence through Private Attribution“. AC Snoeren, Y Kohno, S Savage…. 2007. FIND-Funded pro  …3 cites.
  790. 4. OATH OF HYPOCRITES: FAKE MEDICAL COLLEGES“. AK Menon, MG Radhakrishnan, S David…. 2005. Australian Health …3 cites.
  791. Digital Banking Manifesto: The End of Banks?“. A Lipton, D Shrier, A Pentland. 2016. 3 cites.
  792. Detecting fraudulent activity in a cloud using privacy-friendly data aggregates“. M Solanas, J Hernandez-Castro, D Dutta. 2014. arXiv preprint arXiv:1411.67213 cites.
  793. Double spend races“. C Grunspan, R Pérez-Marco. 2017. arXiv preprint arXiv:1702.028673 cites.
  794. Modeling and verification of the bitcoin protocol“. K Chaudhary, A Fehnker, J Van De Pol…. 2015. arXiv preprint arXiv …3 cites.
  795. Supporting the evaluation of complex search tasks with the SearchTrails tool“. S Franken, U Norbisrath. 2014. … of 24th Annual International Conference on …3 cites.
  796. Blockchains and the Logic of Accountability: Keynote Address“. M Herlihy, M Moir. 2016. Proceedings of the 31st Annual ACM/IEEE …3 cites.
  797. Query-Complexity Amplification for Random Oracles.“. G Demay, P Gazi, U Maurer, B Tackmann. 2015. Springer ICITS3 cites.
  798. Controllable growth and electrostatic properties of Bernal stacked bilayer MoS2“. S Hao, B Yang, Y Gao. 2016. Journal of Applied Physics3 cites.
  799. Tezos: A Self-Amending Crypto-Ledger Position Paper“. LM Goodman. 2014. 3 cites.
  800. What’s So Different about Blockchain?—Blockchain is a Probabilistic State Machine“. K Saito, H Yamada. 2016. Distributed Computing Systems …3 cites.
  801. Security implications of blockchain cloud with analysis of block withholding attack“. DK Tosh, S Shetty, X Liang, CA Kamhoua…. 2017. Proceedings of the 17th …3 cites.
  802. Applications of smart-contracts and smart-property utilizing blockchains“. E Hillbom, T Tillström. 2016. 3 cites.
  803. A first econometric analysis of the CRIX family“. S Chen, CYH Chen, WK Härdle, TM Lee, B Ong. 2016. 3 cites.
  804. Towards scalable and private industrial blockchains“. W Li, A Sforzin, S Fedorov, GO Karame. 2017. Proceedings of the ACM …3 cites.
  805. Scalable Byzantine Consensus via Hardware-assisted Secret Sharing“. J Liu, W Li, GO Karame, N Asokan. 2016. arXiv preprint arXiv:1612.049973 cites.
  806. Криптовалюта: особенности создания и внедрения“. МВ Вотинов, ИВ Мартьянова…. 2015. НОВЫЙ …3 cites.
  807. Abstract and overview proof of work can work“. D Liu, LJ Camp. 2006. Citeseer 2 cites.
  808. Momentum-a memory-hard proof-of-work via finding birthday collisions“. D Larimer. 0. hashcash.org2 cites.
  809. How to Configure Proof-of-Work Functions to Stop Spam.“. S Golze, G Mühl, T Weis, K Betriebssysteme. 2005. Sicherheit2 cites.
  810. Alternatives for Proof of Work, Part 2: Proof of Activity, Proof of Burn, Proof of Capacity, and Byzantine Generals“. R Paterrson. 2015. Abgerufen am 2 cites.
  811. Bitcoin: Proof of Work“. Z Ramzan. 2013. … /bitcoin/v/bitcoin-proof-of-work 2 cites.
  812. Long-range attacks: The serious problem with adaptive proof of work“. V Buterin. 2014. … problem-with-adaptive-proof-of-work … 2 cites.
  813. Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake, 2014“. I Bentov, C Lee, A Mizrahi, M Rosenfeld. 2014. Preprint2 cites.
  814. When proof of work works“. D Liu, LJ Camp. 2006. 2 cites.
  815. A proof of work stealing for dedicated multiprocessors“. UA Acar, SK Muller. 2016. Technical Report CMU-CS-16-114 … 2 cites.
  816. The sum of all chains—let’s converge!, 2015. Presentation for Coinscrum and Proof of Work“. I Grigg. 0. . 2 cites.
  817. SPECTRE: Serialization of Proof-of-work Events: Confirming Transactions via Recursive Elections“. Y Sompolinsky, Y Lewenberg, A Zohar. 2016. . 2 cites.
  818. De Fuentes, Almudena Alcaide,” Hindering false event dissemination with VANETS with proof-of-work mechanisms”, Department of Computer Science“. E Palomar, M Jose. 2014. Elsevier 2 cites.
  819. Gridcoin: Crypto-currency using berkeley open infrastructure network computing grid as a proof of work“. R Halford. 2014. . 2 cites.
  820. Hashcash Proof-of-Work System“. A Black. 1997. . 2 cites.
  821. Designing proof of human-work puzzles for cryptocurrency and beyond“. J Blocki, HS Zhou. 2016. Springer Theory of Cryptography Conference2 cites.
  822. Security Concerns and Issues for Bitcoin“. CA Vyas, M Lunagaria. 2014. Citeseer the proceedings of National Conference cum …2 cites.
  823. Best jobs for ex-offenders“. RL Krannich. 2016. 2 cites.
  824. Systems and methods for authenticating requests from a client running trialware through a proof of work protocol“. Z Ramzan, W Bogorad, V Seshadri, V Antonov…. 2013. Google Patents US Patent …2 cites.
  825. Proofs of work for blockchain protocols“. JA Garay, A Kiayias, G Panagiotakos. 2017. 2 cites.
  826. Hashimoto: I/O bound proof of work. 2014“. T Dryja. 0. URL {https://mirrorx. com/files/hashimoto. pdf}2 cites.
  827. A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database“. L Aniello, R Baldoni, E Gaetani, F Lombardi…. 2017. 2 cites.
  828. Accountability in P2P Democracy“. M Kelaskar. 0. World of Practical Peers, Powerpoint presentation …2 cites.
  829. On decentralizing prediction markets and order books“. J Bonneau, EW Felten, J Clark, A Miller, JA Kroll…. 2014. . 2 cites.
  830. Review of CryptoNote white paper“. S Noether. 2014. … http://monero. cc/downloads/whitepaper_review. pdf …2 cites.
  831. Bitcoin: An Empirical Study of Cryptocurrency“. E Rosen, E Wengrowski, GD Clark, X Gao. 2014. 2 cites.
  832. Reputation Sensitive Message Passing in Content Addressable Networks“. E Buchmann, K Böhm…. 2003. Univ., Fak. für Informatik 2 cites.
  833. Connecting the Blockchain to the Sun to Save the Planet“. LP Johnson, A Isam, N Gogerty, J Zitoli. 2015. 2 cites.
  834. System and methods of determining computational puzzle difficulty for challenge-response authentication“. WC Feng, E Kaiser. 2011. Google Patents US Patent App. 13/050,1232 cites.
  835. Moving to the UK as a GP: The process explained“. R Hays. 2007. Australian family physician2 cites.
  836. System for providing trusted user access of computer systems“. S Marinov, K Miller. 2014. Google Patents US Patent 8,793,7782 cites.
  837. Computers and Internet: Are All Modern Currencies Not Virtual?–The Bitcoin Phenomenon“. D Flint. 2014. Business Law Review2 cites.
  838. Application of Machine Learning Algorithms for Bitcoin Automated Trading“. K Żbikowski. 2016. Springer Machine Intelligence and Big Data in Industry2 cites.
  839. An overview of blockchain technology: Architecture, consensus, and future trends“. Z Zheng, S Xie, H Dai, X Chen…. 2017. Big Data (BigData …2 cites.
  840. The Dual Nature of Bitcoin as Payment Network and Money“. P Tasca. 2016. Browser Download This Paper2 cites.
  841. A study of electronic cash paradigm“. DE Saputra, SH Supangkat. 2014. Information Technology Systems …2 cites.
  842. Blockchain Technologies: The Foreseeable Impact on Society and Industry“. T Aste, P Tasca, T Di Matteo. 2017. Computer2 cites.
  843. Accountable security mechanism based on security service level agreement“. T Takahashi, J Kannisto, J Harju…. 2013. … (ISCC), 2013 IEEE …2 cites.
  844. Electronic Contract Signing Without Using Trusted Third Party“. Z Wan, RH Deng, D Lee. 2015. Springer … Conference on Network and System Security2 cites.
  845. The Determination of a Secondary Wage“. RJ O’Dea. 1968. Journal of Industrial Relations2 cites.
  846. Sex Worker Rights Organizing as Social Movement Unionism: Responding to the Criminalization of Work“. CA Jackson. 2013. 2 cites.
  847. Bitcoin“. M Betancourt. 2013. CTheory2 cites.
  848. Indistinguishable proofs of work or knowledge“. F Baldimtsi, A Kiayias, T Zacharias, B Zhang. 2016. Springer Advances in Cryptology …2 cites.
  849. Latency-hiding work stealing“. SK Muller, UA Acar. 2015. Proceedings of the twenty …2 cites.
  850. What’s new in computers“. PCP Bhatt. 2014. Springer Resonance2 cites.
  851. Blockchain Technology as s Support Infrastructure in e-Government“. S Ølnes, A Jansen. 2017. Springer International Conference on Electronic Government2 cites.
  852. Beyond Bitcoin-Part II: Blockchain-based systems without mining.“. P Forte, D Romano, G Schmid. 2016. IACR Cryptology ePrint Archive2 cites.
  853. Legal Needs and Barriers: The Case for Supporting Representation of Aliens“. R Irwin. 1993. HeinOnline Clearinghouse Rev.2 cites.
  854. Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network“. J Hirshman, Y Huang, S Macke. 2013. 2 cites.
  855. The Compensability of Chronic Stress: A Policy Dilemma for the Ontario Workers’ Compensation Board“. SED Shortt. 1995. JSTOR Canadian Public Policy/Analyse de Politiques2 cites.
  856. Formalising the Bitcoin protocol“. WJB Beukema. 2014. Availabl e at http://referaat. cs. utwente. nl …2 cites.
  857. Does the Velocity of Bitcoins Effect the Price Level of Bitcoin“. MJ DeLeo, W Stull. 2014. Temple University2 cites.
  858. Secure peer-to-peer trading for multiplayer games“. C GauthierDickey, C Ritzdorf. 2012. Network and Systems Support …2 cites.
  859. Comments to the New York department of financial services on the proposed virtual currency regulatory framework“. J Brito, E Dourado. 2014. Public Interest Comment, Mercatus Center …2 cites.
  860. Real world privacy expectations in VANETs real world privacy expectations in VANETs“. M Feiri, J Petit, F Kargl. 2014. 2 cites.
  861. Bitcoin–The Miner’s Dilemma“. I Eyal. 2015. 2 cites.
  862. Fair anonymity for the Tor network“. J Diaz, D Arroyo, FB Rodriguez. 2014. arXiv preprint arXiv:1412.47072 cites.
  863. WHAT IS BITCOIN?“. RA Glantz. 2014. 2 cites.
  864. On the Phase Space of Block-Hiding Strategies.“. A Shomer. 2014. IACR Cryptology ePrint Archive2 cites.
  865. Literature survey of performance benchmarking approaches of BPEL engines“. C Röck, S Harrer. 2014. 2 cites.
  866. Leveraging bitcoin blockchain technology to modernize security perfection under the uniform commercial code“. DS Gerstl. 2016. Springer International Conference of Software Business2 cites.
  867. Consulates and Polonia Social Organizations“. B Heydenkorn. 1985. Canadian Polish Research Institute A Community in Transition: the …2 cites.
  868. The Balance Attack or Why Forkable Blockchains Are Ill-Suited for Consortium“. C Natoli, V Gramoli. 2017. … Systems and Networks (DSN), 2017 47th …2 cites.
  869. Optimized Execution of Business Processes on Blockchain“. L García-Bañuelos, A Ponomarev, M Dumas…. 2017. Springer … Conference on Business …2 cites.
  870. Forthcoming“. YY Hsieh, JP Vergne, S Wang. 0. Public interest (t-1)2 cites.
  871. Algorand“. J Chen, S Micali. 2016. arXiv preprint arXiv:1607.013412 cites.
  872. Economics of Competing Crypto Currencies: Monetary Policy, Miner Reward and Historical Evolution“. Y Zhang, G Song. 2014. 2 cites.
  873. Blockchains and electronic health records“. B Yuan, W Lin, C McDonnell. 2016. Mcdonnell. mit. edu2 cites.
  874. D4. 4-Design of Social Digital Currency“. D Roio, M Sachy, S Lucarelli, B Lietaer, F Bria. 2015. 2 cites.
  875. Addressing spam e-mail using hashcast“. K Curran, JS Honan. 2005. … Journal of Business Data Communications and …2 cites.
  876. Critical Review of Economical Denial of Sustainability (EDoS) Mitigation Techniques“. PS Bawa, S Manickam. 2015. Journal of Computer Science2 cites.
  877. How a finely tuned system of checks and balances has been effectively dismantled“. D Cadman. 2014. Center for Immigration Studies2 cites.
  878. Factom ledger by consensus“. P Snow, B Deery, P Kirby, D Johnston. 2015. 2 cites.
  879. Digitalizing the Malaysian classroom: Barriers, insights and feasibility“. LS Yin. 2013. Jurnal Pengajian Media Malaysia2 cites.
  880. Getting Off the Ground: The Case of Bitcoin“. WJ Luther. 2017. 2 cites.
  881. Practical Aspects of the Bitcoin System“. AKGC Sorge. 2013. arXiv preprint arXiv:1308.67602 cites.
  882. A simple yet efficient approach to combat transaction malleability in bitcoin“. U Rajput, F Abbas, R Hussain, H Eun, H Oh. 2014. Springer International Workshop on …2 cites.
  883. Building Character: How to Grant Actors Limited Copyright Protection for Performances without Creating a New Special of Copyrighted Work“. M Kawabata. 2014. HeinOnline Tex. Rev. Ent. & Sports L.2 cites.
  884. Discovering the social organization of school library work“. J Crispin. 2009. 2 cites.
  885. Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments“. J Schneider, N Fleischhacker, D Schröder…. 2016. Proceedings of the 2016 …2 cites.
  886. Monitoring wildlife conservation using networked RFID for secure positioning“. F Yang, F Zhang, J Wang, DS Hailu. 2012. Springer Communications and Information …2 cites.
  887. Being dissimilar: Religious dissimilarity, gender dissimilarity, value dissimilarity and job satisfaction“. I Ullah, M Usman, AS Niazi, M Farooq…. 2012. … and Business Review2 cites.
  888. Privacy in overlay-based smart traffic systems“. M Florian, I Baumgart. 2013. Local Computer Networks Workshops …2 cites.
  889. Distributed Bitcoin Account Management“. X Zhou, Q Wu, B Qin, X Huang…. 2016. Trustcom/BigDataSE/I​ …2 cites.
  890. Business processes secured by immutable audit trails on the blockchain“. P Snow, B Deery, J Lu, D Johnston, P Kirby…. 2014. 2 cites.
  891. ‘As relevant as banning polo in Greenland’: the absence of ethnographic insight into country sports in the UK“. S Hillyard. 2007. Qualitative Research2 cites.
  892. A case study on education networks and brokerage“. G Martin, O Bohl, AW Scheer…. 2007. Cases on Global E …2 cites.
  893. MI: Cross-layer malleable identity“. SH Khor, A Nakao. 2011. Communications (ICC), 2011 IEEE …2 cites.
  894. Labor Politics and Organizing Strategies in Immigrant‐Owned SMEs: The Case of the Confédération Générale du Travail and Chinese Migrant Workers in France“. YH Chuang. 2014. Wiley Online Library WorkingUSA2 cites.
  895. Future of Payment Platforms“. SB Youssefzadeh. 2014. 2 cites.
  896. Virtual currencies and distributed ledger technology: What is new under the sun and what is hyped repackaging?“. H Leinonen. 2016. Journal of Payments Strategy & Systems2 cites.
  897. The Economics of the Blockchain: A study of its engineering and transaction services marketplace“. D Bargar. 2016. 2 cites.
  898. Bitcoin: The Trade of Digital Signatures“. S Hazratjee. 2015. HeinOnline T. Marshall L. Rev.2 cites.
  899. Notes on Scalable Blockchain Protocols (verson 0.3)“. V Buterin, J Coleman, M Wampler-Doty. 2015. 2 cites.
  900. 4P: Performant private peer-to-peer file sharing“. N Zeilemaker, J Pouwelse…. 2014. Peer-to-Peer Computing …2 cites.
  901. Kudos: A Peer-to-Peer Discussion System Based on Social Voting“. L Matteis. 0. the-blockchain.com2 cites.
  902. Bitcoin: Main Trends and Perspectives“. NE Egorova, KA Torzhevsky. 2016. British Journal of Economics …2 cites.
  903. Bitcoin: Main Trends and Perspectives“. NE Egorova, KA Torzhevsky. 2016. British Journal of Economics …2 cites.
  904. Adding Up the Bits and Pieces: How Big An Effect Will Bitcoin and Crypto Currency Exert on Remote and Interactive Gambling?“. M Owens, AA Lavitch. 2013. Gaming Law Review and Economics2 cites.
  905. Towards a framework for the evaluation and design of distributed ledger technologies in banking and payments“. J Bott, U Milkau. 2016. Journal of Payments Strategy & Systems2 cites.
  906. A probabilistic analysis of the nxt forging algorithm“. S Popov. 2016. Ledger2 cites.
  907. Advancing Egalitarianism“. G Wood, A Buchanan. 2015. … of Digital Currency. Academic Press, San …2 cites.
  908. On Bitcoin Security in the Presence of Broken Cryptographic Primitives“. I Giechaskiel, C Cremers, KB Rasmussen. 2016. Springer European Symposium on …2 cites.
  909. Unclassified worked flints“. H Stopes. 1900. JSTOR Journal of the Anthropological Institute of Great Britain …2 cites.
  910. Deterrence to Hiring Illegal Immigrant Workers: Will the New Employer Sanction Provisions Work“. SE Steele. 2007. HeinOnline Ga. J. Int’l & Comp. L.2 cites.
  911. Work stress in the banking industries of Australia and South Africa: Drivers of stress and legislative responses to the issue“. A Bunn, R Guthrie, N Smit. 2013. International Journal of …2 cites.
  912. Analýza virtuální měny Bitcoin“. P HUŘŤÁK. 2013. 2 cites.
  913. Блокчейн как коммуникационная основа формирования цифровой экономики: преимущества и проблемы“. ММ Пряников, АВ Чугунов. 2017. International Journal of Open …2 cites.
  914. Heritage documentation for conservation: partnership in learning“. M Santana Quintero, B Blake, R Eppich…. 2008. The Spirit of …2 cites.
  915. Bitcoin pour remplacer les devises?“. FR Velde. 2015. Revue d’économie financière2 cites.
  916. Правовой Режим валюты нового поколения“. ЕЮ Моисеева, АА Рубан. 2015. Достижения вузовской науки2 cites.
  917. MEMCOIN2: A Hybrid Proof of Work/Proof of Stake Cryptocurrency with Democratic Control“. A Mackenzie. 2010. Technical Report. http://mc2 … 1 cites.
  918. Alternatives for proof of work, part 1: Proof of stake“. R Patterson. 2015. … /proof-of-stake-proof-of-work-comparison/[cited 13.10 …1 cites.
  919. The economics of proof-of-work“. D Liu. 2007. HeinOnline ISJLP1 cites.
  920. The decrits consensus algorithm: Decentralized agreement without proof of work“. R Pfeiffer. 2014. arXiv preprint arXiv:1411.11011 cites.
  921. The bitcoin mining game: On the optimality of honesty in proof-of-work consensus mechanism“. J Beccuti, C Jaag. 2017. 1 cites.
  922. Memcoin2: a hybrid proof of work/proof of stake cryptocurrency“. A Mackenzie. 2014. 1 cites.
  923. Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem (Full version)“. A Biryukov, D Khovratovich. 0. cryptolux.org1 cites.
  924. Proof of stake: Definite. an implementation of constant staking rewards to promote increased network activity“. M Croteau, E Litranab. 2014. August 1 cites.
  925. A network-dependent rewarding system: proof-of-mining“. J Lao. 2014. arXiv preprint arXiv:1409.79481 cites.
  926. Building a bitcoin miner on an FPGA“. S Oliveira, F Soares, G Flach, M Johann…. 2012. XXVII SIM—South …1 cites.
  927. Legal aspects of work-related mental illness and disorder“. S Adler, R Atlas. 2004. The Israel journal of psychiatry and related …1 cites.
  929. Barter to bitcoin: the changing visage of transactions“. D Awasthi. 2015. Elk Asia Pacific Journal of Finance and Risk …1 cites.
  930. Proof of Stake Blockchain: Performance and Scalability for Groupware Communications“. J Spasovski, P Eklund. 2017. Proceedings of the International …1 cites.
  931. Using Block Chain for Peer-to-Peer Proof-of-Location“. G Brambilla, M Amoretti, F Zanichelli. 2016. arXiv preprint arXiv:1607.001741 cites.
  932. Lottery Protocol for Cryptocurrency“. J Kume, M Abe, T Okamoto. 2015. SCIS20151 cites.
  933. Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions.“. X Boyen, C Carr, T Haines. 2016. IACR Cryptology ePrint Archive1 cites.
  934. Efficient algorithms for broadcast and consensus based on proofs of work“. L Eckey, S Faust, J Loss. 2017. 1 cites.
  935. Defeating DDoS Attack By Using Software Puzzle Scheme“. AB Kudupudi, MA Kumar. 2017. IJSEAT1 cites.
  936. Survey of consensus protocols on blockchain applications“. LS Sankar, M Sindhu…. 2017. … (ICACCS), 2017 4th …1 cites.
  937. Double-spend Attack Models with Time Advantange for Bitcoin“. C Pinzón, C Rocha. 2016. Elsevier Electronic Notes in Theoretical Computer Science1 cites.
  938. Oligarchic Control of Business-to-Business Blockchains“. LN Lundbaek, M Huth. 2017. Security and Privacy Workshops …1 cites.
  939. RB-PoW: A reputation based approach tocryptographic mitigation of denial-of-serviceattacks“. F LILKAER, C TELJSTEDT. 2013. 1 cites.
  940. Further applications of the blockchain“. AL Tsilidou, G Foroglou. 2015. 1 cites.
  941. The Disadvantages of the Sanctions Provisions“. A Hernandez. 1989. HeinOnline In Defense of the Alien1 cites.
  942. A theory for lightweight cryptocurrency ledgers“. B White. 2015. . 1 cites.
  943. Metacaptcha: A metamorphic throttling service for the web“. A Dua, T Bui, T Le, N Huynh…. 2014. Network Protocols (ICNP) …1 cites.
  944. States, Federal Welfare Reform and Immigrants: The Challenges of the First Year“. S Steisel, A Morse. 1997. HeinOnline In Defense of the Alien1 cites.
  945. Subchains Facilitate On-chain Scaling and Fast Transaction Verification“. P Rizun. 2016. 1 cites.
  946. Traversing Bitcoin’s P2P network: insights into the structure of a decentralised currency“. S Feld, M Schönfeld, M Werner. 2016. International Journal of …1 cites.
  947. Explaining the relationship between organizational commitment, organizational health and employee creativity of the Social Security Organization“. S Salajeghe, A Movagharzade. 2016. International Journal of Humanities and …1 cites.
  948. Research issues regarding the Bitcoin and Alternative Coins digital currencies“. A Pîrjan, DM Petrosanu, M Huth…. 2015. Journal of Information …1 cites.
  949. Handling bitcoin conflicts through a glimpse of structure“. T Lajoie-Mazenc, R Ludinard…. 2017. Proceedings of the …1 cites.
  950. Transaction locking and masternode consensus: A mechanism for mitigating double spending attacks“. E Duffield, H Schinzel, F Gutierrez. 2014. 1 cites.
  951. The State of Cryptocurrencies, Their Issues and Policy Interactions“. R Subramanian, T Chino. 2015. Journal of International …1 cites.
  952. Short Paper: Service-Oriented Sharding for Blockchains“. AE Gencer, R van Renesse, EG Sirer. 2017. Financial Cryptography and Data …1 cites.
  953. Method and apparatus for the limitation of the mining of blocks on a block chain“. DR Ferrin. 2016. Google Patents US Patent App. 14/987,8421 cites.
  954. Cryptocurrencies and the Anonymous Nature of Transactions on the Internet“. EA Casale. 2015. 1 cites.
  955. Sending Message into a Definite Future: Non-Parallelizable Case“. W Mao. 2000. 1 cites.
  956. Authority Printed Upon Emptiness“. K O’Hara. 2015. IEEE Internet Computing1 cites.
  957. SPAM control using CPU Timestamps“. S Jagannath, R Mohandas. 2013. International Journal of …1 cites.
  958. A study of digital currency cryptography for business marketing and finance security“. TH Kim. 2016. Asia-pacific Journal of Multimedia Services Convergent …1 cites.
  959. An Introduction to the Blockchain and Its Implications for Libraries and Medicine“. MB Hoy. 2017. Taylor & Francis Medical Reference Services Quarterly1 cites.
  960. Customization of quality models in software projects to enhance the business value“. V Suma, BR Shubhamangala…. 2013. … Conference (IACC), 2013 …1 cites.
  961. Privacy with Secondary Use of Personal Information“. S Wohlgemuth, K Takaragi…. 2016. MKWI Research-in …1 cites.
  962. Disposable E-mail adresses“. AM Yegenian. 2009. . 1 cites.
  963. Netcoin: A Traceable P2P Electronic Cash System“. H Tewari, EO Nuallain. 2015. Web Services (ICWS), 2015 IEEE …1 cites.
  964. Eventually Returning to Strong Consistency.“. M Vukolic. 2016. IEEE Data Eng. Bull.1 cites.
  965. The Bitcoin Phenomenon Analysis“. B Tomaš, I Švogor. 2015. 28th Bled eConference1 cites.
  966. Personal Archive Service System using Blockchain Technology: Case Study, Promising and Challenging“. Z Chen, Y Zhu. 2017. AI & Mobile Services (AIMS), 2017 IEEE …1 cites.
  967. The future of money and further applications of the blockchain“. R Adams, G Parry, P Godsiff, P Ward. 2017. Wiley Online Library Strategic Change1 cites.
  968. A model for collaborative blockchain-based video delivery relying on advanced network services chains“. N Herbaut, N Negru. 2017. IEEE Communications Magazine1 cites.
  969. The cross-section of crypto-currencies as financial assets: An overview“. H Elendner, S Trimborn, B Ong, TM Lee. 2016. 1 cites.
  970. BlockNDN: A bitcoin blockchain decentralized system over named data networking“. T Jin, X Zhang, Y Liu, K Lei. 2017. Ubiquitous and Future Networks …1 cites.
  971. Theory Beyond the Codes“. M Betancourt. 2013. Ctheory< retrieved from http://ctheory. net/articles. aspx1 cites.
  972. DOUBLE SPENDING PREVENTION IN BITCOINS NETWORK“. M Kadam, P Jha, S Jaiswal. 2015. International Journal of Computer …1 cites.
  973. Fully Anonymous Transferable Ecash.“. H Tewari, A Hughes. 2016. IACR Cryptology ePrint Archive1 cites.
  974. Trusted Timestamp in Cryptocurrency Block Chain“. J Klusácek. 2014. Student EEICT1 cites.
  975. An anonymous distributed electronic voting system using Zerocoin“. Y Takabatake, D Kotani, Y Okabe. 2016. 1 cites.
  976. On offline payments with bitcoin“. A Dmitrienko, D Noack, AR Sadeghi…. 2014. Springer … Conference on Financial …1 cites.
  977. Digital Immolation“. J Bonneau. 2010. Springer Cambridge International Workshop on Security …1 cites.
  978. Yet another note on block withholding attack on bitcoin mining pools“. S Bag, K Sakurai. 2016. Springer International Conference on Information Security1 cites.
  979. Overcoming Limits of Blockchain for IoT Applications“. F Buccafurri, G Lax, S Nicolazzo…. 2017. Proceedings of the 12th …1 cites.
  980. Detecting the presence of a vmm through side-effect analysis 15-712 project final report“. J Franklin, M Luk, JM McCune. 2005. Selected Project Reports, Fall …1 cites.
  981. Augmenting a webmail application with cryptographic puzzles to deflect spam“. M Cristea, B Groza. 2011. … , Mobility and Security (NTMS), 2011 4th …1 cites.
  982. Providing better confidentiality and authentication on the Internet using Namecoin and MinimaLT“. F Jacobs. 2014. arXiv preprint arXiv:1407.64531 cites.
  983. Syscoin: A Peer-to-Peer Electronic Cash System with Blockchain-Based Services for E-Business“. J Sidhu. 2017. … Communication and Networks (ICCCN), 2017 26th …1 cites.
  984. Of strategies and structures: Motif-based fingerprinting analysis of online reputation networks“. M Wichtlhuber, S Bücker, R Kluge…. 2016. … (LCN), 2016 IEEE …1 cites.
  985. Introduction to Parallel Computing“. M Skuhersky. 0. mit.edu1 cites.
  986. Quantos somos? The second national population census of Mozambique“. G Harrison. 1998. Taylor & Francis 1 cites.
  987. Ripple Protocol Consensus Algorithm Review“. P Todd. 2015. 1 cites.
  988. A Bitcoin system with no mining and no history transactions: Build a compact Bitcoin system“. X Qian. 2014. arXiv preprint arXiv:1404.42751 cites.
  989. Risk based authentication“. NA Allen. 2015. Google Patents US Patent 9,202,0381 cites.
  990. Secure and Trustable Electronic Medical Records Sharing using Blockchain“. A Dubovitskaya, Z Xu, S Ryu, M Schumacher…. 2017. arXiv preprint arXiv …1 cites.
  991. Record Forms in the Syracuse Health Demonstration“. GC Ruhland, IF Thompson. 1926. American Journal of Public …1 cites.
  992. Methodology to measure a front end ASIC for physic experiment“. F Druillole. 2003. Nuclear Science Symposium Conference Record …1 cites.
  993. Lastregelung von Web Services mittels Proof-of-Work Funktionen.“. S Golze, G Mühl, MC Jaeger. 2005. KiVS Kurzbeiträge und …1 cites.
  994. Fairness in Überlastsituationen mittels Proof-Of-Work Funktionen“. S Golze. 2009. 1 cites.
  995. Postęp w technologii systemów kryptowalutowych“. W Nowakowski. 2015. Elektronika: konstrukcje, technologie …1 cites.
  996. Avaliação da segurança de protocolos criptográficos usados em moedas virtuais“. VHG Moia, MAA Henriques. 0. VII Sétimo Encontro dos Alunos e Docentes do …1 cites.
  997. Bitcoins y el problema de los generales bizantinos“. C Pérez Solà, J Herrera Joancomartí. 2014. 1 cites.
  998. Децентрализованные сервисы“. МВ Шпеко. 2014. … системы и технологии в образовании, науке и …1 cites.
  999. Proof-of-Work“. J SVENSSON, J ZEECK. 0. csc.kth.se0 cites.


(Featured Image: ‘Bitcoin Mining: Mine Like a Professional Miner‘ by Herbert Sim)