1. A gentle introduction to how i2p works. (n.d.). Accessed on July 2018 https://geti2p.net/en/docs/how/intro
2. Back, A. (2002). Hashcash-a denial of service counter-measure. Belkasoft. Retrieved from https://belkasoft.com/
3. White Paper: The Deep Web: Surfacing Hidden Value
4. Blockchain and Bitcoin Offer New Approach, Risks to Cyber Security. (n.d.). Accessed on July 2018, https://online.maryville.edu/blog/blockchain-and-bitcoin-offer-new-approach-risks-to-cyber-security/
5. Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael. Taher ElGamal.