1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted 1(2012), 28 (2008)
2. Lecture Notes in Computer Science;E Androulaki,2013
3. Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using p2p network traffic. In: Christin, N., Safavi-Naini, R. (eds.) Financial Cryptography and Data Security, pp. 469–485. Lecture Notes in Computer Science. Springer, Berlin (2014)
4. Eyal, I., Sirer, E.: Majority is not enough: Bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) Financial Cryptography and Data Security, pp. 436–454. Lecture Notes in Computer Science. Springer, Berlin (2014)
5. Żbikowski, K.: Time series forecasting with volume weighted support vector machines. In Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds.) Beyond Databases, Architectures, and Structures. Communications in Computer and Information Science. Springer International Publishing, Berlin, Vol. 424, pp. 250–258 (2014)