References

  1. 51% double spending attack. Available at http://www.coindesk.com/51-attacks-real-threat-bitcoin/.
  2. Bitcoin charts. Available at https://blockchain.info/charts.
  3. Bitcoins at coffee shop. Available at http://www.coindesk.com/bitcoin-payments-make-debut-at-mexican-university/.
  4. Double spending risk. Available at http://www.coindesk.com/double-spending-risk-bitcoin-network-fork/.
  5. Hashrate and difficulty. Available at https://blockchain.info/stats.
  6. Hashrate Chart. Available at https://blockchain.info/pools.
  7. Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski & Lukasz Mazurek (2014): Modeling Bitcoin Contracts by Timed Automata. In: Proceedings of FORMATS'14, LNCS 8711. Springer, pp. 7–22, doi:10.1007/978-3-319-10512-3_2.
  8. Andreas M. Antonopoulos (2014): Mastering Bitcoin: Unlocking Digital Crypto-Currencies, 1st edition. O'Reilly Media, Inc..
  9. Adam Back (2002): Hashcash - A Denial of Service Counter-Measure. Technical Report. Available at www.hashcash.org/papers/hashcash.pdf.
  10. Martijn Bastiaan (2015): Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin. Available at http://referaat.cs.utwente.nl/conference/22/paper/7473/preventing-the-51-attack-a-stochastic-analysis-of-two-phase-proof-of-work-in-bitcoin.pdf..
  11. Jan A. Bergstra & Karl de Leeuw (2013): Questions related to Bitcoin and other Informational Money. CoRR abs/1305.5956. Available at http://arxiv.org/abs/1305.5956.
  12. W.J.B Beukema (2014): Formalising the Bitcoin protocol. Available at http://referaat.cs.utwente.nl/conference/21/paper/7450/formalising-the-bitcoin-protocol.pdf.
  13. Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll & Edward W. Felten (2015): Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.. IACR Cryptology ePrint Archive 2015, pp. 261, doi:10.1109/SP.2015.14.
  14. Alexandre David, Kim G. Larsen, Axel Legay, Marius Mikucionis & Danny Bøgsted Poulsen (2015): Uppaal SMC tutorial. STTT 17(4), pp. 397–415, doi:10.1007/s10009-014-0361-y.
  15. M. Herrmann (2012): Implementation, Evaluation and Detection of a Doublespend-attack on Bitcoin. ETH Zürich, Department of Computer Science.
  16. Ghassan O. Karame, Elli Androulaki & Srdjan Capkun (2012): Double-spending Fast Payments in Bitcoin. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12. ACM, New York, NY, USA, pp. 906–917, doi:10.1145/2382196.2382292.
  17. Satoshi Nakamoto (2008): Bitcoin: A peer-to-peer electronic cash system. Available at http://bitcoin.org/bitcoin.pdf.
  18. Krzysztof Okupski (2014): Bitcoin Developer Reference. Available at http://enetium.com/resources/Bitcoin.pdf.
  19. David Perry (2012): Bitcoin Attacks in Plain English. Available at http://codinginmysleep.com/bitcoin-attacks-in-plain-english/.
  20. Dorit Ron & Adi Shamir (2013): Quantitative Analysis of the Full Bitcoin Transaction Graph. In: Proceedings of Financial Cryptography and Data Security (FC'13), LNCS 7859. Springer, pp. 6–24, doi:10.1007/978-3-642-39884-1_2.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org