1. Alpár, G., Jacobs, B.: Credential design in attribute-based identity management. In: 3rd TILTing Perspectives Conference on Bridging Distances in Technology and Regulation, pp. 189–204 (2013)
2. Anagnostopoulos, A., Becchetti, L., Castillo, C., Gionis, A., Leonardi, S.: Power in unity: forming teams in large-scale community systems. In: CIKM, pp. 599–608 (2010)
3. Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: International Conference on Financial Cryptography and Data Security, pp. 34–51. Springer, Berlin (2013)
4. Balkan, A.: Ethical design manifesto Ind.ie. Online available: https://ind.ie/ethical-design/ . Accessed 22 July 2017
5. Buchegger, S., Crowcroft, J., Krishnamurthy, B., Strufe, T.: Decentralized systems for privacy preservation (Dagstuhl Seminar 13062). Dagstuhl Rep. 3(2), 22–44 (2013)