1. Karame, G.O., Androulaki, E., Capkun, S.: In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 906–917. ACM (2012)
2. Karame, G.O., Androulaki, E., Roeschlin, M., Gervais, A., Čapkun, S.: Misbehavior in Bitcoin: a study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1), 21 (2015).
https://doi.org/10.1145/2732196
3. GAP600: Gap600 bitcoin transactions guaranteed.
http://gap600.com/
(2017). Accessed 12 Nov 2018
4. Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: In: Proceedings of the IEEE International Conference on Peer-to-Peer Computing (P2P). Trento (2013)
5. Biryukov, A., Khovratovich, D., Pustogarov, I.: In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 15–29. ACM (2014)