1. D.Siegel “Understanding the DAO attack.” [Online].2016. Available:https://www.coindesk.com/understanding‐dao‐hack‐journalists/.
2. C.Baldwin “Bitcoin worth 72 million stolen from Bitfinex exchange in Hong Kong.” [Online].Reuters 2016. Available:http://reut.rs/2gc7iQ9.
3. M.BellareandP.Rogaway “Random oracles are practical: A paradigm for designing efficient protocols ” inProceedings of the 1st Acm Conference on Computer and Communications Security Fairfax 1993 pp.62–73.
4. A.JuelsandJ. G.Brainard “Client puzzles: A cryptographic countermeasure against connection depletion attacks ” inProceedings of the Network and Distributed System Security Symposium NDSS 1999 1999 pp.151–65.
5. J. A.Kroll I. C.Davey andE. W.Felten “The economics of Bitcoin mining or Bitcoin in the presence of adversaries ” inProceedings of The Twelfth Workshop on the Economics of Information Security (WEIS 2013) Washington 2013.