Guide to attribute based access control (abac) definition and considerations, 2014. ,
Bitcoin: A peer-to-peer electronic cash system, 2008. ,
A Digital Signature Based on a Conventional Encryption Function, In: Advances in Cryptology, vol.87, pp.369-378, 1987. ,
DOI : 10.1007/3-540-48184-2_32
Pricing via Processing or Combatting Junk Mail, Advances in Cryptology, CRYPTO 92, 12th Annual International Cryptology Conference, pp.139-147, 1992. ,
DOI : 10.1007/3-540-48071-4_10
URL : http://www.wisdom.weizmann.ac.il/~naor/PAPERS/pvp.pdf
The cryptographic hash function ripemd, p.160, 1997. ,
The Elliptic Curve Digital Signature Algorithm (ECDSA), International Journal of Information Security, vol.1, issue.1, pp.36-63, 2001. ,
DOI : 10.1007/s102070100002
URL : http://cacr.math.uwaterloo.ca/~ajmeneze/publications/ecdsa.ps
Blockchain technology: principles and applications, 2015. ,
DOI : 10.4337/9781784717766.00019
Internet of Things, Blockchain and Shared Economy Applications, International Workshop on Data Mining and IoT Systems, pp.461-466, 2016. ,
DOI : 10.1016/j.procs.2016.09.074
URL : https://doi.org/10.1016/j.procs.2016.09.074
Sharing ledgers for sharing economies: an exploration of mutual distributed ledgers (aka blockchain technology), The Journal of Finantial Perspectives, vol.3, pp.38-69, 2015. ,
Decentralizing Privacy: Using Blockchain to Protect Personal Data, 2015 IEEE Security and Privacy Workshops, pp.180-184, 2015. ,
DOI : 10.1109/SPW.2015.27
bitcoin.it/wiki/transaction fees 15 Bitcoin Wiki: retrieved https://en.bitcoin.it/wiki/colored coins 16. Current Standard for Dust Limit: retrieved, 2017. ,