C. Vincent, . Hu, F. David, K. Rick, S. Adam et al., Guide to attribute based access control (abac) definition and considerations, 2014.

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.

R. C. Merkle, A Digital Signature Based on a Conventional Encryption Function, In: Advances in Cryptology, vol.87, pp.369-378, 1987.
DOI : 10.1007/3-540-48184-2_32

C. Dwork and M. Naor, Pricing via Processing or Combatting Junk Mail, Advances in Cryptology, CRYPTO 92, 12th Annual International Cryptology Conference, pp.139-147, 1992.
DOI : 10.1007/3-540-48071-4_10

URL : http://www.wisdom.weizmann.ac.il/~naor/PAPERS/pvp.pdf

B. Preneel, A. Bosselaers, and H. Dobbertin, The cryptographic hash function ripemd, p.160, 1997.

D. Johnson, A. Menezes, and S. Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA), International Journal of Information Security, vol.1, issue.1, pp.36-63, 2001.
DOI : 10.1007/s102070100002

URL : http://cacr.math.uwaterloo.ca/~ajmeneze/publications/ecdsa.ps

M. Pilkington, Blockchain technology: principles and applications, 2015.
DOI : 10.4337/9781784717766.00019

S. Huckle, R. Bhattacharya, M. White, and N. Beloff, Internet of Things, Blockchain and Shared Economy Applications, International Workshop on Data Mining and IoT Systems, pp.461-466, 2016.
DOI : 10.1016/j.procs.2016.09.074

URL : https://doi.org/10.1016/j.procs.2016.09.074

M. Mainelli and M. Smith, Sharing ledgers for sharing economies: an exploration of mutual distributed ledgers (aka blockchain technology), The Journal of Finantial Perspectives, vol.3, pp.38-69, 2015.

G. Zyskind and O. Nathan, Decentralizing Privacy: Using Blockchain to Protect Personal Data, 2015 IEEE Security and Privacy Workshops, pp.180-184, 2015.
DOI : 10.1109/SPW.2015.27

B. Wiki, bitcoin.it/wiki/transaction fees 15 Bitcoin Wiki: retrieved https://en.bitcoin.it/wiki/colored coins 16. Current Standard for Dust Limit: retrieved, 2017.