1. Joseph Bonneau. 2016. EthIKS: Using Ethereum to audit a CONIKS key transparency log International Conference on Financial Cryptography and Data Security. Springer, 95--105.
2. Vitalik Buterin. 2016. Ethereum Light client protocol. https://github.com/ethereum/wiki/wiki/Light-client-protocol. (2016).
3. John R Douceur. 2002. The sybil attack International Workshop on Peer-to-Peer Systems. Springer, 251--260.
4. Google. 2017. Key Transparency. https://github.com/google/keytransparency. (2017).
5. http://coniks.org. 2018. A CONIKS implementation in Golang. https://github.com/coniks-sys/coniks-go. (2018). Accessed on 08.01.2018.