[1]
D. Yaga, P. Mell, N. Roby, and K. Scarfone,
“Blockchain technology overview,” National Institute of Standards and Technology, Gaithersburg, MD, NIST IR 8202, Oct. 2018. doi:
10.6028/NIST.IR.8202.
[2]
A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies. Princeton University Press, 2016.
[3]
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten,
“SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies,” in
2015 IEEE Symposium on Security and Privacy, 2015, pp. 104–121. doi:
10.1109/SP.2015.14.
[4]
A. M. Antonopoulos, Mastering Bitcoin: Programming the open blockchain, Second edition. Sebastopol, CA: O’Reilly, 2017.
[6]
R. C. Merkle,
“A Digital Signature Based on a Conventional Encryption Function,” in
Advances in Cryptology — CRYPTO ’87, vol. 293, C. Pomerance, Ed., Berlin, Heidelberg: Springer Berlin Heidelberg, 1988, pp. 369–378. doi:
10.1007/3-540-48184-2_32.
[9]
U.S. Securities and Exchange Commission,
“U.s. Securities and exchange commission.” Accessed: Mar. 18, 2026. [Online]. Available:
https://www.sec.gov
[14]
A. Singh, T.-W. Ngan, P. Druschel, and D. S. Wallach,
“Eclipse Attacks on Overlay Networks: Threats and Defenses,” in
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, Barcelona, Spain: IEEE, 2006, pp. 1–12. doi:
10.1109/INFOCOM.2006.231.
[15]
E. Heilman, A. Kendler, A. Zohar, and S. Goldberg,
“Eclipse Attacks on Bitcoin’s Peer-to-Peer Network.” Accessed: Oct. 21, 2025. [Online]. Available:
https://eprint.iacr.org/2015/263
[16]
E. Androulaki
et al.,
“Hyperledger fabric: A distributed operating system for permissioned blockchains,” in
Proceedings of the Thirteenth EuroSys Conference, Porto Portugal: ACM, Apr. 2018, pp. 1–15. doi:
10.1145/3190508.3190538.