1. Ateniese G, Bonacina I, Faonio A, Galesi N (2014) Proofs of space: when space is of the essence. In: Abdalla M, De Prisco R (eds) Security and cryptography for networks. Springer International Publishing, pp 538–557
2. Aublin PL, Mokhtar SB, Quéma V (2013) RBFT: redundant byzantine fault tolerance. In: Proceedings of the 2013 IEEE 33rd international conference on distributed computing systems, ICDCS ’13. IEEE Computer Society, pp 297–306
3. Baier C, Katoen JP (2008) Principles of model checking (representation and mind series). The MIT Press, Cambridge/London
4. Bertot Y (2006) Coq in a hurry. CoRR abs/cs/0603118, http://arxiv.org/abs/cs/0603118, cs/0603118
5. Bonneau J, Miller A, Clark J, Narayanan A, Kroll JA, Felten EW (2015) SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: Proceedings of the 2015 IEEE symposium on security and privacy, SP ’15. IEEE Computer Society, Washington, DC, pp 104–121