1. Acar, G., Englehardt, S., & Narayanan, A. (2018). Four cents to deanonymize: companies reverse hashed email addresses.
https://freedom-to-tinker.com/2018/04/09/four-cents-to-deanonymize-companies-reverse-hashed-email-addresses/
. Accessed 10 June 2018.
2. Apthorpe, N., Reisman, D., & Feamster, N. (2017). A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic. CoRR, abs/1705.06805. Retrieved from
http://arxiv.org/abs/1705.06805
. Accessed January 2018.
3. Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. In J. Lane, V. Stodden, S. Bender, & H. Nissenbaum (Eds.), Privacy, big data, and the public good: frameworks for engagement (pp. 44–75). New York: Cambridge University Press.
https://doi.org/10.1017/CBO9781107590205
.
4. Benet, J. (2014). IPFS - content addressed, versioned, P2P file system. CoRR, abs/1407 (Vol. 3561).
http://arxiv.org/abs/1407.3561
. Accessed May 2018.
5. Brito, J. (2018). What does the EU’s general data protection regulation mean for open blockchain networks? Retrieved April 20, 2018, from https://coincenter.org/link/what-does-the-eu-s-general-data-protection-regulation-mean-for-open-blockchain-networks