@article{buterin2014next,
  title={A next-generation smart contract and decentralized application platform},
  author={Buterin, Vitalik},
  journal={White Paper},
  year={2014}
}

@misc{nakamoto2008bitcoin,
  title={Bitcoin: A peer-to-peer electronic cash system},
  author={Nakamoto, Satoshi},
  year={2008},
  url = {https://bitcoin.org/bitcoin.pdf},
}

@TECHREPORT{ethersphere2016sw3,
  author = {Viktor Tron and Aron Fischer and Daniel Nagy A and Zsolt Felföldi and Nick Johnson},
  title = {swap, swear and swindle: incentive system for swarm},
  institution = {Ethersphere},
  note = {Ethersphere Orange Papers 1},
  year = {2016},
  url = {http://swarm-gateways.net/bzz:/swarm/ethersphere/orange-papers/1/sw^3.pdf}
}

@TECHREPORT{ethersphere2016smash,
  author = {Viktor Tron and Aron Fischer and Nick Johnson},
  title = {smash-proof: auditable storage in swarm secured by masked audit secret hash},
  institution = {Ethersphere},
  note = {Ethersphere Orange Papers 2},
  year = {2016},
  url = {http://swarm-gateways.net/bzz:/swarm/ethersphere/orange-papers/2/smash.pdf}
}

@TECHREPORT{ethersphere2019swap,
  author = {Viktor Tron and Aron Fischer and Daniel A Nagy},
  title = {Generalised swap swear and swindle games},
  institution = {Ethersphere},
  note = {draft},
  year = {2019}
}

@TECHREPORT{tronetal2019-network,
  author = {Viktor Tron and Aron Fischer and Daniel A Nagy},
  title = {Swarm: a decentralised peer-to-peer network for messaging andstorage},
  institution = {Ethersphere},
  note = {draft},
  year = {2019}
}


% tronetal2019-network

@misc{filecoin2014,
  author = {Filecoin},
  title = {Filecoin: a cryptocurrency operated file storage network},
  year = {2014},
  url={http://filecoin.io/filecoin.pdf}
}

@misc{ipfs2014,
  author = {IPFS},
  title = {Interplanetary File System},
  year = {2014},
  url={http://ipfs.io/ipfs.pdf}
}

@TECHREPORT{wilkinson2014metadisk,
  title={MetaDisk A Blockchain-Based Decentralized File Storage Application},
  author={Wilkinson, Shawn and Lowry, Jim},
  year={2014},
  institution={Metadisk},
  url={http://metadisk.org/metadisk.pdf},
}

@inproceedings{plank2006optimizing,
  title={Optimizing {Cauchy Reed-Solomon} codes for fault-tolerant network storage applications},
  author={Plank, James S and Xu, Lihao},
  booktitle={Network Computing and Applications, 2006. NCA 2006. Fifth IEEE International Symposium on},
  pages={173--180},
  year={2006},
  organization={IEEE}
}

@inproceedings{plank2009performance,
  title={A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries for Storage.},
  author={Plank, James S and Luo, Jianqiang and Schuman, Catherine D and Xu, Lihao and Wilcox-O'Hearn, Zooko and others},
  booktitle={FAST},
  volume={9},
  pages={253--265},
  year={2009}
}

@techreport{lubyetal1995CRS,
  title={An xor-based erasure-resilient coding scheme},
  author={Bloemer, Johannes and Malik Kalfane and Richard Karp and Marek Karpinski and Michael Luby and David Zuckerman},
  year={1995},
  note={Technical Report TR-95-048},
  institution={International Computer Science Institute}
}

@MISC{buterin2014erasure,
  title={Secret sharing and erasure coding:  A guide for the aspiring dropbox decentralizer},
  author={Vitalik Buterin},
  year={2014},
  url={https://blog.ethereum.org/2014/08/16/secret-sharing-erasure-coding-guide-aspiring-dropbox-decentralizer}
}

@techreport{vorick2014sia,
  title={Sia: Simple Decentralized Storage},
  author={Vorick, David and Champine, Luke},
  year={2014},
  institution={Sia},
  url={http://www.siacoin.com/whitepaper.pdf},
}

@techreport{jansen2014onions,
  title={From onions to shallots: Rewarding Tor relays with {TEARS}},
  author={Jansen, Rob and Miller, Andrew and Syverson, Paul and Ford, Bryan},
  year={2014},
  institution={DTIC Document}
}

@misc{florincoin2014,
author  = {Florincoin},
title  = {Florincoin},
publisher = {florincoin},
url  = {http://florincoin.org/florincoin.pdf},
year   = {2014}
}

@misc{kwoketal2005,
title  = {A Server-mediated Peer-to-peer System},
author = {Kwok, S. H. and  K. Y. Chan and  Y. M. Cheung},
note   = {ACM SIGecom Exchanges 5 (Apr. 2005): 38-47. Print.},
year   = {2005}
}

@inproceedings{miller2014permacoin,
  title={Permacoin: Repurposing bitcoin work for data preservation},
  author={Miller, Andrew and Juels, Ari and Shi, Elaine and Parno, Bryan and Katz, Jonathan},
  booktitle={Security and Privacy (SP), 2014 IEEE Symposium on},
  pages={475--490},
  year={2014},
  url={https://www.cs.umd.edu/~elaine/docs/permacoin.pdf},
  organization={IEEE}
}

@TECHREPORT{wilkinsonetal2014storj,
  title={Storj: A Peer-to-Peer Cloud Storage Network},
  author={Wilkinson, Shawn and Boshevski, Tome and Brandoff, Josh and Buterin, Vitalik},
  year={2014},
  note={v1.01},
  institution={storj},
  url={https://storj.io/storj.pdf}
}

@techreport{ghoshetal2014tor,
  title  = {A {TorPath} to {TorCoin}: Proof-of-Bandwidth Altcoins for Compensating Relays},
  author = { Mainak Ghosh and  M. Richardson and  B. Ford and R. Jansen},
  year   = {2014},
  institution = {petsymposium},
  url={https://www.petsymposium.org/2014/papers/Ghosh.pdf}
}


% proof of custody papers

% Hovav Shacham, Brent Waters, Compact Proofs of Retrievability, Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90-107
@article{shacham2013compact,
  title={Compact proofs of retrievability},
  author={Shacham, Hovav and Waters, Brent},
  journal={Journal of cryptology},
  volume={26},
  number={3},
  pages={442--483},
  year={2013},
  publisher={Springer}
}

@incollection{ateniese2009proofs,
  title={Proofs of storage from homomorphic identification protocols},
  author={Ateniese, Giuseppe and Kamara, Seny and Katz, Jonathan},
  booktitle={Advances in Cryptology--ASIACRYPT 2009},
  pages={319--333},
  year={2009},
  publisher={Springer}
}

@inproceedings{bowers2009proofs,
  title={Proofs of retrievability: Theory and implementation},
  author={Bowers, Kevin D and Juels, Ari and Oprea, Alina},
  booktitle={Proceedings of the 2009 ACM workshop on Cloud computing security},
  pages={43--54},
  year={2009},
  organization={ACM}
}

@incollection{dodis2009proofs,
  title={Proofs of retrievability via hardness amplification},
  author={Dodis, Yevgeniy and Vadhan, Salil and Wichs, Daniel},
  booktitle={Theory of cryptography},
  pages={109--127},
  year={2009},
  publisher={Springer}
}

@inproceedings{zheng2011fair,
  title={Fair and dynamic proofs of retrievability},
  author={Zheng, Qingji and Xu, Shouhuai},
  booktitle={Proceedings of the first ACM conference on Data and application security and privacy},
  pages={237--248},
  year={2011},
  organization={ACM}
}

@article{zhu2011zero,
  title={Zero-knowledge proofs of retrievability},
  author={Zhu, Yan and Wang, HuaiXi and Hu, ZeXing and Ahn, Gail-Joon and Hu, Hongxin},
  journal={Science China Information Sciences},
  volume={54},
  number={8},
  pages={1608--1617},
  year={2011},
  publisher={Springer}
}

@inproceedings{yuan2013proofs,
  title={Proofs of retrievability with public verifiability and constant communication cost in cloud},
  author={Yuan, Jiawei and Yu, Shucheng},
  booktitle={Proceedings of the 2013 international workshop on Security in cloud computing},
  pages={19--26},
  year={2013},
  organization={ACM}
}

@article{kravchenkocryptographic,
  title={Cryptographic proof of custody for incentivized filesharing},
  author={Kravchenko, Pavel and Zamfir, Vlad}
}

@inproceedings{merkle1980protocols,
  title={Protocols for public key cryptosystems},
  author={Merkle, Ralph C},
  year={1980},
  pages={122},
  booktitle={Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society},
  organization={IEEE}
}


% routing p2p papers
% kademlia

@incollection{maymounkov2002kademlia,
  title={Kademlia: A peer-to-peer information system based on the xor metric},
  author={Maymounkov, Petar and Mazieres, David},
  booktitle={Peer-to-Peer Systems},
  pages={53--65},
  year={2002},
  publisher={Springer}
}

@article{ou2010performance,
  title={Performance evaluation of a Kademlia-based communication-oriented P2P system under churn},
  author={Ou, Zhonghong and Harjula, Erkki and Kassinen, Otso and Ylianttila, Mika},
  journal={Computer Networks},
  volume={54},
  number={5},
  pages={689--705},
  year={2010},
  url={http://www.sciencedirect.com/science/article/pii/S1389128609002990},
  publisher={Elsevier}
}

@inproceedings{jimenez2011sub,
  title={Sub-second lookups on a large-scale {Kademlia}-based overlay},
  author={Jimenez, Raul and Osmani, Flutra and Knutsson, Bj{\"o}rn},
  booktitle={Peer-to-Peer Computing (P2P), 2011 IEEE International Conference on},
  pages={82--91},
  year={2011},
  url={http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=6038665},
  organization={IEEE}
}

@inproceedings{baumgart2007s,
  title={S/kademlia: A practicable approach towards secure key-based routing},
  author={Baumgart, Ingmar and Mies, Sebastian},
  booktitle={Parallel and Distributed Systems, 2007 International Conference on},
  volume={2},
  pages={1--8},
  year={2007},
  url={http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4447808},
  organization={IEEE}
}

@article{zhao2004tapestry,
  title={Tapestry: A resilient global-scale overlay for service deployment},
  author={Zhao, Ben Y and Huang, Ling and Stribling, Jeremy and Rhea, Sean C and Joseph, Anthony D and Kubiatowicz, John D},
  journal={IEEE Journal on selected areas in communications},
  volume={22},
  number={1},
  pages={41--53},
  year={2004},
  publisher={IEEE}
}

% S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker.  A Scalable Content Addressable Network.  InProceedings ofACM SIGCOMM, 2001.

% F. Kaashoek and D. R. Karger.Koorde:  A Simple Degree-Optimal Hash Table.   InProceedings of the 2nd InternationalWorkshop on Peer To Peer Systems (IPTPS), 2003.

% [22]  J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer,C. Wells, and B. Zhao. OceanStore: An Architecture for Global-Scale Persistent Storage. InProceedings of the 9th InternationalConference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), November 20

% [11]  F. Dabek, B. Zhao, P. Druschel, J. Kubiatowicz, and I. Stoica.  Towards a Common API for Structured Peer-to-Peer Overlays.InProceeding of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS), February 2003

@article{aspnes2007skip,
  title={Skip graphs},
  author={Aspnes, James and Shah, Gauri},
  journal={Acm transactions on algorithms (talg)},
  volume={3},
  number={4},
  pages={37--es},
  year={2007},
  publisher={ACM New York, NY, USA}
}

@techreport{crosby2007analysis,
  title={An analysis of bittorrent’s two {Kademlia}-based dhts},
  author={Crosby, Scott A and Wallach, Dan S},
  year={2007},
  url={http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.76.8338\&rep=rep1\&type=pdf},
  institution={Citeseer}
}

@inproceedings{roos2015determining,
  title={Determining the Hop Count in {Kademlia}-type Systems},
  author={Roos, Stefanie and Salah, Hani and Strufe, Thorsten},
  booktitle={IEEE ICCCN},
  url={https://www.researchgate.net/profile/Stefanie\_Roos/publication/274910383\_Determining\_the\_Hop\_Count\_in\_Kademlia-type\_Systems/links/55bf70f808aed621de1390c2.pdf},
  year={2015}
}

@article{roos2013comprehending,
  title={Comprehending {Kademlia} Routing: A Theoretical Framework for the Hop Count Distribution},
  author={Roos, Stefanie and Salah, Hani and Strufe, Thorsten},
  journal={arXiv preprint arXiv:1307.7000},
  url={http://arxiv.org/abs/1307.7000},
  year={2013}
}

@inproceedings{stutzbach2006improving,
  title={Improving Lookup Performance Over a Widely-Deployed {DHT}.},
  author={Stutzbach, Daniel and Rejaie, Reza},
  booktitle={INFOCOM},
  url={https://ng.gnunet.org/sites/default/files/infocom06-kad.pdf},
  year={2006}
}

@inproceedings{binzenhofer2007improving,
  title={Improving the performance and robustness of {Kademlia}-based overlay networks},
  author={Binzenh{\"o}fer, Andreas and Schnabel, Holger},
  booktitle={Kommunikation in Verteilten Systemen (KiVS)},
  pages={15--26},
  year={2007},
  url={http://link.springer.com/chapter/10.1007/978-3-540-69962-0\_2},
  organization={Springer}
}

@inproceedings{khan2011routing,
  title={The routing performance of logarithmic-hop structured p2p overlay},
  author={Khan, Saiful and Gani, Abdullah and Sreekandath, Mahesh},
  booktitle={Open Systems (ICOS), 2011 IEEE Conference on},
  pages={202--207},
  year={2011},
  url={http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=6079289},
  organization={IEEE}
}

@inproceedings{salah2014characterizing,
  title={Characterizing graph-theoretic properties of a large-scale {DHT}: Measurements vs. simulations},
  author={Salah, Hani and Roos, Stefanie and Strufe, Thorsten},
  booktitle={Computers and Communication (ISCC), 2014 IEEE Symposium on},
  pages={1--7},
  year={2014},
  url={http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=6912540},
  organization={IEEE}
}

@inproceedings{kaune2008embracing,
  title={Embracing the peer next door: Proximity in {Kademlia}},
  author={Kaune, Sebastian and Lauinger, Tobias and Kova{\v{c}}evi{\'c}, Aleksandra and Pussep, Konstantin},
  booktitle={Peer-to-Peer Computing, 2008. P2P'08. Eighth International Conference on},
  pages={343--350},
  year={2008},
  url={http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4627296},
  organization={IEEE}
}

@inproceedings{heep2010r,
  title={R/Kademlia: Recursive and topology-aware overlay routing},
  author={Heep, Bernhard},
  booktitle={Telecommunication Networks and Applications Conference (ATNAC), 2010 Australasian},
  pages={102--107},
  year={2010},
  organization={IEEE},
  url={http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5680244}
}

@article{lua2005survey,
  title={A survey and comparison of peer-to-peer overlay network schemes},
  author={Lua, Eng Keong and Crowcroft, Jon and Pias, Marcelo and Sharma, Ravi and Lim, Steven},
  journal={IEEE Communications Surveys \& Tutorials},
  volume={7},
  number={2},
  pages={72--93},
  year={2005},
  url={http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=1610546},
  publisher={IEEE}
}

@inproceedings{varvello2009walkable,
  title={A Walkable {Kademlia} network for virtual worlds.},
  author={Varvello, Matteo and Diot, Christophe and Biersack, Ernst},
  booktitle={IPTPS},
  pages={2},
  url={https://www.usenix.org/event/iptps09/tech/full\_papers/varvello/varvello\_html/},
  year={2009}
}

@inproceedings{guangmin2009improved,
  title={An improved {Kademlia} routing algorithm for P2P network},
  author={Guangmin, Liang},
  booktitle={New Trends in Information and Service Science, 2009. NISS'09. International Conference on},
  pages={63--66},
  year={2009},
  url={http://en.cnki.com.cn/Article\_en/CJFDTotal-WXYJ200909039.htm},
  organization={IEEE}
}

@inproceedings{skodzik2014hartkad,
  title={Hartkad: A hard real-time {Kademlia} approach},
  author={Skodzik, Jan and Danielis, Peter and Altmann, Vlado and Timmermann, Dirk},
  booktitle={Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th},
  pages={309--314},
  year={2014},
  url={http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=6866588},
  organization={IEEE}
}


%streaming kademlia

@inproceedings{wu2007kadstreaming,
  title={KadStreaming: a novel {Kademlia P2P} network-based {VoD} streaming scheme},
  author={Wu, Jie and Liu, BiSheng and Zhang, ShiYong and Lu, ZhiHui and Zhong, YiPing},
  booktitle={Computer and Information Technology, 2007. CIT 2007. 7th IEEE International Conference on},
  pages={405--410},
  year={2007},
  organization={IEEE}
}

@phdthesis{ciancaglini2013key,
  title={From key-based to content-based routing: system interconnection and video streaming applications},
  author={Ciancaglini, Vincenzo},
  year={2013},
  url={https://tel.archives-ouvertes.fr/tel-00875653/},
  school={Universit{\'e} Nice Sophia Antipolis}
}

@inproceedings{matsuzono2016nrts,
  title={NRTS: Content name-based real-time streaming},
  author={Matsuzono, Kazuhisa and Asaeda, Hitoshi},
  booktitle={2016 13th IEEE Annual Consumer Communications \& Networking Conference (CCNC)},
  pages={537--543},
  year={2016},
  url={http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=7444837},
  organization={IEEE}
}

@inproceedings{ciancaglini2013ccn,
  title={CCN-TV: a data-centric approach to real-time video services},
  author={Ciancaglini, Vincenzo and Piro, Giuseppe and Loti, Riccardo and Grieco, Luigi Alfredo and Liquori, Luigi},
  booktitle={Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on},
  pages={982--989},
  year={2013},
  url={http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=6550523},
  organization={IEEE}
}


% caching

@inproceedings{einziger2013kaleidoscope,
  title={Kaleidoscope: Adding colors to {Kademlia}},
  author={Einziger, Gil and Friedman, Roy and Kibbar, Eyal},
  booktitle={Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on},
  pages={1--10},
  year={2013},
  organization={IEEE},
  url={http://www.cs.technion.ac.il/~gilga/P2P2013\_49.pdf}
}

@inproceedings{annapureddy2005shark,
  title={Shark: Scaling file servers via cooperative caching},
  author={Annapureddy, Siddhartha and Freedman, Michael J and Mazieres, David},
  booktitle={Proceedings of the 2nd conference on Symposium on Networked Systems Design \& Implementation-Volume 2},
  pages={129--142},
  year={2005},
  organization={USENIX Association},
  url={https://www.cs.princeton.edu/~mfreed/docs/shark-nsdi05.pdf}
}


%chord

@inproceedings{karger2004diminished,
  title={Diminished {Chord}: A protocol for heterogeneous subgroup formation in peer-to-peer networks},
  author={Karger, David R and Ruhl, Matthias},
  booktitle={International Workshop on Peer-to-Peer Systems},
  pages={288--297},
  year={2004},
  organization={Springer}
}


%broadcast

@inproceedings{matl2015effective,
  title={Effective manycast messaging for {Kademlia} network},
  author={Matl, Lubos and Cerny, Tomas and Donahoo, Michael J},
  booktitle={Proceedings of the 30th Annual ACM Symposium on Applied Computing},
  pages={646--652},
  year={2015},
  url={http://dl.acm.org/citation.cfm?id=2695903},
  organization={ACM}
}

@article{czirkos2013solution,
  title={Solution for the broadcasting in the {Kademlia} peer-to-peer overlay},
  author={Czirkos, Zolt{\'a}n and Hossz{\'u}, G{\'a}bor},
  journal={Computer Networks},
  volume={57},
  number={8},
  pages={1853--1862},
  year={2013},
  url={http://www.sciencedirect.com/science/article/pii/S1389128613000777},
  publisher={Elsevier}
}

@article{lin2013optimal,
  title={Optimal Schedule on Message Broadcast Tree in Structured Peer-to-Peer Networks.},
  author={Lin, Jeng-Wei and Wang, Tun Wei and Chang, Ray-I},
  journal={Journal of Information Science \& Engineering},
  volume={29},
  number={1},
  year={2013},
  url={http://www.iis.sinica.edu.tw/page/jise/2013/201301\_11.pdf}
}

@inproceedings{el2003efficient,
  title={Efficient broadcast in structured P2P networks},
  author={El-Ansary, Sameh and Alima, Luc Onana and Brand, Per and Haridi, Seif},
  booktitle={International workshop on Peer-to-Peer systems},
  pages={304--314},
  year={2003},
  organization={Springer},
  url={http://www-kiv.zcu.cz/~ledvina/DHT/paper3.pdf}
}

@article{kwon2005path,
  title={Path-aware overlay multicast},
  author={Kwon, Minseok and Fahmy, Sonia},
  journal={Computer Networks},
  volume={47},
  number={1},
  pages={23--45},
  year={2005},
  url={http://www.sciencedirect.com/science/article/pii/S1389128604002026},
  publisher={Elsevier}
}


% alternatives

@inproceedings{rowstron2001pastry,
  title={Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems},
  author={Rowstron, Antony and Druschel, Peter},
  booktitle={IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing},
  pages={329--350},
  year={2001},
  url={http://link.springer.com/chapter/10.1007/3-540-45518-3\_18},
  organization={Springer}
}


% pub/sub

@inproceedings{zhang2005combining,
  title={Combining flexibility and scalability in a peer-to-peer publish/subscribe system},
  author={Zhang, Chi and Krishnamurthy, Arvind and Wang, Randolph Y and Singh, Jaswinder Pal},
  booktitle={Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware},
  pages={102--123},
  year={2005},
  organization={Springer-Verlag New York, Inc.},
  url={https://homes.cs.washington.edu/~arvind/papers/pubsub.pdf}
}

@inproceedings{anceaume2006semantic,
  title={A semantic overlay for self-peer-to-peer publish/subscribe},
  author={Anceaume, Emmanuelle and Gradinariu, Maria and Datta, Ajoy Kumar and Simon, Gwendal and Virgillito, Antonino},
  booktitle={26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)},
  pages={22--22},
  year={2006},
  url={http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=1648809},
  organization={IEEE}
}

@inproceedings{terpstra2003peer,
  title={A peer-to-peer approach to content-based publish/subscribe},
  author={Terpstra, Wesley W and Behnel, Stefan and Fiege, Ludger and Zeidler, Andreas and Buchmann, Alejandro P},
  booktitle={Proceedings of the 2nd international workshop on Distributed event-based systems},
  pages={1--8},
  year={2003},
  organization={ACM},
  url={http://gossple2.irisa.fr/~akermarr/Rebecca.pdf}
}


%payment channels

@techreport{diferrante2017payment,
  author={Matthew Di Ferrante},
  title={Ethereum Payment Channel in 50 Lines of Code},
  institution={Medium blog post},
  year = {2017}
}

@techreport{mcdonald2017payment,
  author={Jim McDonald},
  title={Building Ethereum Payment Channels},
  institution={Medium blog post},
  year = {2017}
}

@article{dziembowskiperun,
  title={PERUN: Virtual Payment Channels over Cryptographic Currencies⋆},
  author={Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian and Malinowski, Daniel},
  year = {2017}
}

@techreport{heilman2016tumblebit,
  title={TumbleBit: An untrusted Bitcoin-compatible anonymous payment hub},
  author={Heilman, Ethan and Alshenibr, Leen and Baldimtsi, Foteini and Scafuro, Alessandra and Goldberg, Sharon},
  year={2016},
  institution={NDSS}
}

@article{green2016bolt,
  title={Bolt: Anonymous Payment Channels for Decentralized Currencies.},
  author={Green, Matthew D and Miers, Ian},
  journal={IACR Cryptology ePrint Archive},
  volume={2016},
  pages={701},
  year={2016}
}

@article{miller2017sprites,
  title={Sprites: Payment Channels that Go Faster than Lightning},
  author={Miller, Andrew and Bentov, Iddo and Kumaresan, Ranjit and McCorry, Patrick},
  journal={arXiv preprint arXiv:1702.05812},
  year={2017}
}

@inproceedings{chiesa2017decentralized,
  title={Decentralized Anonymous Micropayments},
  author={Chiesa, Alessandro and Green, Matthew and Liu, Jingcheng and Miao, Peihan and Miers, Ian and Mishra, Pratyush},
  booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
  pages={609--642},
  year={2017},
  organization={Springer}
}

@article{malavolta2017concurrency,
  title={Concurrency and Privacy with Payment-Channel Networks},
  author={Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Ravi, Srivatsan},
  journal={?},
  year={2017}
}

@article{btcmicro2014,
  author = {?},
  title  = {Bitcoin Micropayments, a New Enabling Technology},
  journal   = {Bitcoin Magazine},
  url    = {http://bitcoinmagazine.com/12654/bitcoin-micropayments-new-enabling-technology},
  year   = {2014}
}

@inproceedings{decker2015fast,
  title={A fast and scalable payment network with bitcoin duplex micropayment channels},
  author={Decker, Christian and Wattenhofer, Roger},
  booktitle={Symposium on Self-Stabilizing Systems},
  pages={3--18},
  year={2015},
  organization={Springer}
}

@techreport{poon2015bitcoin,
  title={The bitcoin lightning network: Scalable off-chain instant payments},
  author={Poon, Joseph and Dryja, Thaddeus},
  year={2015},
  institution={https://lightning.network}
}

@techreport{tremback2015universal,
  title={Universal Payment Channels},
  author={Tremback, Jehan and Hess, Zack},
  institution={?},
  url={http://altheamesh.com/documents/universal-payment-channels.pdf},
  year={2015}
}

@techreport{thomas2015protocol,
  title={A protocol for interledger payments},
  author={Thomas, Stefan and Schwartz, Evan},
  url={https://interledger.org/interledger.pdf},
  year={2015}
}

@techreport{prihodko2016flare,
  title={Flare: An Approach to Routing in Lightning Network},
  author={Prihodko, Pavel and Zhigulin, Slava and Sahno, Mykola and Ostrovskiy, Aleksei and Osuntokun, Olaoluwa},
  note={version 0.1 July},
  institution={?},
  url={http://bitfury.com/content/5-white-papers-research/whitepaper\_flare\_an\_approach\_to\_routing\_in\_lightning\_network\_7\_7\_2016.pdf},
  year={2016},
}

% security, attack resilience

@inproceedings{sit2002security,
  title={Security considerations for peer-to-peer distributed hash tables},
  author={Sit, Emil and Morris, Robert},
  booktitle={International Workshop on Peer-to-Peer Systems},
  pages={261--269},
  year={2002},
  organization={Springer},
  url={https://web.eecs.umich.edu/~zmao/eecs589/papers/p2pSec.pdf}
}

@inproceedings{wang2012real,
  title={Real-world sybil attacks in {BitTorrent} mainline {DHT}},
  author={Wang, Liang and Kangasharju, Jussi},
  booktitle={Global Communications Conference (GLOBECOM), 2012 IEEE},
  pages={826--832},
  year={2012},
  organization={IEEE},
  url={https://www.cl.cam.ac.uk/~lw525/publications/security.pdf}
}

@inproceedings{locher2010poisoning,
  title={Poisoning the {Kad} network},
  author={Locher, Thomas and Mysicka, David and Schmid, Stefan and Wattenhofer, Roger},
  booktitle={International Conference on Distributed Computing and Networking},
  pages={195--206},
  year={2010},
  organization={Springer},
  url={http://www.disco.ethz.ch/publications/icdcn10\_-1\_181.pdf}
}


% network

@inproceedings{freedman2005non,
  title={Non-Transitive Connectivity and {DHT}s.},
  author={Freedman, Michael J and Lakshminarayanan, Karthik and Stoica, Ion},
  booktitle={WORLDS},
  volume={5},
  pages={10--10},
  year={2005},
  url={http://www.coralcdn.org/docs/ntr-worlds05.pdf}
}

@inproceedings{ramasubramanian2004beehive,
  title={Beehive: {O(1)} Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays.},
  author={Ramasubramanian, Venugopalan and Sirer, Emin G{\"u}n},
  booktitle={Nsdi},
  volume={4},
  pages={8--8},
  year={2004},
  URL={https://lieanu.github.io/papers/ds/beehive.pdf}
}

@inproceedings{rhea2005fixing,
  title={Fixing the Embarrassing Slowness of {OpenDHT} on {PlanetLab.}},
  author={Rhea, Sean C and Chun, Byung-Gon and Kubiatowicz, John and Shenker, Scott},
  booktitle={WORLDS},
  volume={5},
  pages={5--5},
  year={2005},
  url={http://www.srhea.net/papers/opendht-worlds05.pdf}
}

@inproceedings{freedman2010experiences,
  title={Experiences with {CoralCDN}: A Five-Year Operational View.},
  author={Freedman, Michael J},
  booktitle={NSDI},
  pages={95--110},
  year={2010},
  url={http://www.coralcdn.org/docs/coral-nsdi10.pdf}
}

@techreport{goel2003herbivore,
  title={Herbivore: A scalable and efficient protocol for anonymous communication},
  author={Goel, Sharad and Robson, Mark and Polte, Milo and Sirer, Emin},
  year={2003},
  institution={Cornell University},
  url={ https://www.cs.cornell.edu/people/egs/herbivore/herbivore.pdf}
}

@inproceedings{sirer2004eluding,
  title={Eluding carnivores: File sharing with strong anonymity},
  author={Sirer, Emin G{\"u}n and Goel, Sharad and Robson, Mark and Engin, Doǧan},
  booktitle={Proceedings of the 11th workshop on ACM SIGOPS European workshop},
  pages={19},
  year={2004},
  organization={ACM},
  url={https://www.cs.cornell.edu/people/egs/papers/herbivore-esigops.pdf}
}

@inproceedings{cai2013probabilistic,
  title={A probabilistic analysis of {Kademlia} networks},
  author={Cai, Xing Shi and Devroye, Luc},
  booktitle={International Symposium on Algorithms and Computation},
  pages={711--721},
  year={2013},
  organization={Springer},
  url={http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.471.7125\&rep=rep1\&type=pdf}
}

@inproceedings{wang2013measuring,
  title={Measuring large-scale distributed systems: case of {BitTorrent mainline DHT}},
  author={Wang, Liang and Kangasharju, Jussi},
  booktitle={IEEE P2P 2013 Proceedings},
  pages={1--10},
  year={2013},
  organization={IEEE},
  url={https://www.cs.helsinki.fi/u/lxwang/publications/P2P2013\_13.pdf}
}

@article{kelner2011electric,
  title={Electric routing and concurrent flow cutting},
  author={Kelner, Jonathan and Maymounkov, Petar},
  journal={Theoretical Computer Science},
  volume={412},
  number={32},
  pages={4123--4135},
  year={2011},
  publisher={Elsevier},
  url={http://arxiv.org/pdf/0909.2859v1.pdf}
}

@inproceedings{kwon2016riffle,
  title={Riffle: An Efficient Communication System With Strong Anonymity},
  author={Albert Kwon and David Lazar and Srinivas Devadas and Bryan Ford},
  booktitle={Proceedings on Privacy Enhancing Technologies 2016},
  pages={1--20},
  year={2016},
  organization={de Gruyter},
  url={https://people.csail.mit.edu/devadas/pubs/riffle.pdf}
}

@techreport{popov2016tangle,
  title={The tangle},
  author={Serguei Popov},
  year={2016},
  institution={Jinn Labs},
  note={IOTA white paper. draft v  0.6},
  url={http://iotatoken.com/IOTA\_Whitepaper.pdf}
}

@inproceedings{bayer2012efficient,
  title={Efficient zero-knowledge argument for correctness of a shuffle},
  author={Bayer, Stephanie and Groth, Jens},
  booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
  pages={263--280},
  year={2012},
  organization={Springer}
}

@article{chor1998private,
  title={Private information retrieval},
  author={Chor, Benny and Kushilevitz, Eyal and Goldreich, Oded and Sudan, Madhu},
  journal={Journal of the ACM (JACM)},
  volume={45},
  number={6},
  pages={965--981},
  year={1998},
  url={http://dl.acm.org/citation.cfm?id=293350},
  publisher={ACM}
}

@inproceedings{corrigan2010dissent,
  title={Dissent: accountable anonymous group messaging},
  author={Corrigan-Gibbs, Henry and Ford, Bryan},
  booktitle={Proceedings of the 17th ACM conference on Computer and communications security},
  pages={340--350},
  year={2010},
  url={http://dl.acm.org/citation.cfm?id=1866346},
  organization={ACM}
}

@inproceedings{wolinsky2012dissent,
  title={Dissent in numbers: Making strong anonymity scale},
  author={Wolinsky, David Isaac and Corrigan-Gibbs, Henry and Ford, Bryan and Johnson, Aaron},
  booktitle={Presented as part of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)},
  pages={179--182},
  url={https://www.usenix.org/node/170846},
  year={2012}
}

@inproceedings{bonneau2014mixcoin,
  title={Mixcoin: Anonymity for Bitcoin with accountable mixes},
  author={Bonneau, Joseph and Narayanan, Arvind and Miller, Andrew and Clark, Jeremy and Kroll, Joshua A and Felten, Edward W},
  booktitle={International Conference on Financial Cryptography and Data Security},
  pages={486--504},
  year={2014},
  url={http://link.springer.com/chapter/10.1007/978-3-662-45472-5\_31},
  organization={Springer}
}

% MPEG-DASH and CCN

% Stefan Lederer, Christopher Müller, Benjamin Rainer, Christian Timmerer, and Hermann Hellwagner, “An Experimental Analysis of Dynamic Adaptive Streaming over HTTP in Content Centric Networks”, in Proceedings of the IEEE International Conference on Multimedia and Expo 2013, San Jose, USA, July, 2013

% Yaning Liu, Joost Geurts, Jean-Charles Point, Stefan Lederer, Benjamin Rainer, Christopher Mueller, Chrstian Timmerer and Hermann Hellwagner, “Dynamic Adaptive Streaming over CCN: A Caching and Overhead Analysis”, in Proceedings of the IEEE international Conference on Communication (ICC) 2013 – Next-Generation Networking Symposium, Budapest, Hungary, June, 2013.

% Stefan Lederer, Christopher Müller, Benjamin Rainer, Christian Timmerer, and Hermann Hellwagner, “Adaptive Streaming over Content Centric Networks in Mobile Networks using Multiple Links”, in Proceedings of the IEEE International Workshop on Immersive & Interactive Multimedia Communications over the Future Internet, Budapest, Hungary, June, 2013.

% Christopher Mueller, Stefan Lederer, Joerg Poecher, and Christian Timmerer, “libdash – An Open Source Software Library for the MPEG-DASH Standard”, in Proceedings of the IEEE International Conference on Multimedia and Expo 2013, San Jose, USA, July, 2013

% Buffer Management in Probabilistic
% Peer-to-Peer Communication Protocols
% Boris Koldehofe
% http://lpdwww.epfl.ch/koldehof/pub/srds03.pdf

@misc{
	SWARMCODE,
	AUTHOR={The Swarm Team},
	TITLE={Golang Swarm implementation},
	PUBLISHER={Swarm},
	MONTH={June},
	YEAR={2019},
	HOWPUBLISHED={github.com},
	NOTE={v4.0.1; 0b9a3ea4},
}

@article{
	SWARMGUIDE,
	AUTHOR={The Swarm Team},
	TITLE={Swarm-Guide},
	PUBLISHER={Swarm},
	MONTH={June},
	YEAR={2019},
	HOWPUBLISHED={github.com},
	NOTE={892cd90},
}

@book{
	MASTERINGBITCOIN,
	AUTHOR={Andreas M. Antonopoulos},
	TITLE={Mastering Bitcoin},
	PUBLISHER={O'Reilly},
	EDITION={First},
	MONTH={December},
	YEAR={2014},
}

@book{
	KECCAK,
	AUTHOR={Bertoni, Guido; Daemen Joan; Peeters Michaël; Van Assche, Gilles},
	TITLE={The Keccak Reference},
	PUBLISHER={Self-published},
	HOWPUBLISHED={keccak.team},
	MONTH={January},
	YEAR={2011},
}

@misc{
	ETHWIKI:RLP,
	AUTHOR={Ethereum Foundation},
	TITLE={Ethereum Wiki - RLP specification},
	PUBLISHER={Self-published},
	HOWPUBLISHED={https://github.com/ethereum/wiki/wiki/RLP},
	NOTE={Retrieved 21.06.2019},	
	
}

@misc {
	ETHWIKI:ENODE,
	AUTHOR={Ethereum Foundation},
	TITLE={Ethereum Wiki - Enode URL format},
	PUBLISHER={Self-published},
	HOWPUBLISHED={https://github.com/ethereum/wiki/wiki/enode-url-format},
	NOTE={Retrieved 21.06.2019},	
}

@misc {
	ETHWIKI:WHISPER,
	AUTHOR={Ethereum Foundation},
	TITLE={Ethereum Wiki - Whisper specification},
	PUBLISHER={Self-published},
	HOWPUBLISHED={https://github.com/ethereum/wiki/wiki/Whisper-pages},
	NOTE={Retrieved 24.06.2019},
}

@misc {
	IETF:ABNF,
	AUTHOR={Network Working Group},
	TITLE={Aug},
	PUBLISHER={IETF},
	HOWPUBLISHED={foo},
	NOTE={Retrieved 01.08.2019},
}

@misc{zeronet,
author={{ZeroNet community}},
title={ZeroNet documentation},
year={2019},
url={https://zeronet.io/docs/}
}

% Protobuf JSON mapping \url{https://developers.google.com/protocol-buffers/docs/proto3#json}

% https://github.com/ethereum/eth2.0-specs/blob/master/specs/phase0/p2p-interface.md


% fair data economy

@misc{HarariDavos2020Mar,
	title = {{Yuval Harari's blistering warning to Davos}},
	author = {Yuval Harari}, 
	journal = {World Economic Forum},
	year = {2020},
	month = {Mar},
	note = {[Online; accessed 2. Mar. 2020]},
	url = {https://www.weforum.org/agenda/2020/01/yuval-hararis-warning-davos-speech-future-predications}
}

@misc{MirrorWorlds2020Feb,
	title = {{A deluge of data is giving rise to a new economy}},
	journal = {Economist},
	year = {2020},
	month = {Feb},
	note = {[Online; accessed 26. Feb. 2020]},
	url = {https://www.economist.com/special-report/2020/02/20/a-deluge-of-data-is-giving-rise-to-a-new-economy},
	key = {Economist}
}

@misc{DigitalPlurality2020Feb,
	title = {{Are data more like oil or sunlight?}},
	journal = {Economist},
	year = {2020},
	month = {Feb},
	note = {[Online; accessed 26. Feb. 2020]},
	url = {https://www.economist.com/special-report/2020/02/20/are-data-more-like-oil-or-sunlight},
	key = {Economist}
}

@misc{SpreadingOut2020Feb,
	title = {{Should data be crunched at the centre or at the edge?}},
	journal = {Economist},
	year = {2020},
	month = {Feb},
	note = {[Online; accessed 26. Feb. 2020]},
	url = {https://www.economist.com/special-report/2020/02/20/should-data-be-crunched-at-the-centre-or-at-the-edge},
	key = {Economist}
}

@misc{AIssemblyLine2020Feb,
	title = {{Integrating data is getting harder, but also more important}},
	journal = {Economist},
	year = {2020},
	month = {Feb},
	note = {[Online; accessed 27. Feb. 2020]},
	url = {https://www.economist.com/special-report/2020/02/20/integrating-data-is-getting-harder-but-also-more-important},
	key = {Economist}
}

@misc{VirtualNationalism2020Feb,
	title = {{Governments are erecting borders for data}},
	journal = {Economist},
	year = {2020},
	month = {Feb},
	note = {[Online; accessed 27. Feb. 2020]},
	url = {https://www.economist.com/special-report/2020/02/20/governments-are-erecting-borders-for-data},
	key = {Economist}
}

@misc{TheWinner2020Feb,
	title = {{Who will benefit most from the data economy?}},
	journal = {Economist},
	year = {2020},
	month = {Feb},
	note = {[Online; accessed 27. Feb. 2020]},
	url = {https://www.economist.com/special-report/2020/02/20/who-will-benefit-most-from-the-data-economy},
	key = {Economist}
}

@techreport{EUWhitePaperAI2020Feb,
     title = {{On Artificial Intelligence - A European approach to excellence and trust}},
     author = "{European Commission}",
     year = {2020},
     institution = {European Commission},
     month = {01}
}

@book{Lee2018Sep,
	author = {Lee, Kai-Fu},
	title = {{AI Superpowers: China, Silicon Valley, and the New World Order}},
	year = {2018},
	month = {Sep},
	isbn = {978-132854639-5},
	publisher = {Houghton Mifflin Harcourt},
	url = {https://www.amazon.com/AI-Superpowers-China-Silicon-Valley/dp/132854639X}
}

@misc{EUDataStrategy2020Feb,
	title = {{European data strategy}},
	author = "{European Commission}",
	journal = {European Commission - European Commission},
	year = {2020},
	month = {Feb},
	note = {[Online; accessed 3. Mar. 2020]},
	url = {https://ec.europa.eu/info/strategy/priorities-2019-2024/europe-fit-digital-age/european-data-strategy_en}
}

@article{perrin2016double,
  title={The double ratchet algorithm},
  author={Perrin, Trevor and Marlinspike, Moxie},
  journal={GitHub wiki},
  year={2016}
}


@article{marlinspike2016x3dh,
  title={The x3dh key agreement protocol},
  author={Marlinspike, Moxie and Perrin, Trevor},
  journal={Open Whisper Systems},
  year={2016}
}


@inproceedings{cohn2017formal,
  title={A formal security analysis of the signal messaging protocol},
  author={Cohn-Gordon, Katriel and Cremers, Cas and Dowling, Benjamin and Garratt, Luke and Stebila, Douglas},
  booktitle={2017 IEEE European Symposium on Security and Privacy (EuroS\&P)},
  pages={451--466},
  year={2017},
  organization={IEEE}
}

@inproceedings{alwen2019double,
  title={The double ratchet: Security notions, proofs, and modularization for the signal protocol},
  author={Alwen, Jo{\"e}l and Coretti, Sandro and Dodis, Yevgeniy},
  booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
  pages={129--158},
  year={2019},
  organization={Springer}
}


@misc{tron2018,
author={{Tron Foundation}},
title={TRON: Advanced Decentralised Blockchain Platform},
year={2019},
url={https://tron.network/static/doc/white_paper_v_2_0.pdf}
}

@misc{bittorrent2019,
author={{BitTorrent Foundation}},
title={BitTorrent White Paper},
version={0.8.7},
year={2019},
url={https://www.bittorrent.com/btt/btt-docs/BitTorrent_(BTT)_White_Paper_v0.8.7_Feb_2019.pdf}
}

@inproceedings{cohen2003incentives,
  title={Incentives build robustness in BitTorrent},
  author={Cohen, Bram},
  booktitle={Workshop on Economics of Peer-to-Peer systems},
  volume={6},
  pages={68--72},
  year={2003}
}

@inproceedings{piatek2007incentives,
  title={Do incentives build robustness in BitTorrent},
  author={Piatek, Michael and Isdal, Tomas and Anderson, Thomas and Krishnamurthy, Arvind and Venkataramani, Arun},
  booktitle={Proceedings of NSDI; 4th USENIX  Symposium on Networked Systems Design and Implementation},
  year={2007}
}

@misc{locher2006free,
  title={Free riding in BitTorrent is cheap},
  author={Locher, Thomas and Moore, Patrick and Schmid, Stefan and Wattenhofer, Roger},
    booktitle={Proceedings of HotNets},
  year={2006}
}

@misc{carlson2010ims,
  title={Well, These New Zuckerberg IMs Won't Help Facebook's Privacy Problems},
  author={Nicholas Carlson},
  institution={Business Insider},
  url={https://www.businessinsider.com/well-these-new-zuckerberg-ims-wont-help-facebooks-privacy-problems-2010-5},
  year={2010}
}

@InProceedings{pouwelse2005bittorrent,
author="Pouwelse, Johan
and Garbacki, Pawe{\l}
and Epema, Dick
and Sips, Henk",
editor="Castro, Miguel
and van Renesse, Robbert",
title="The Bittorrent P2P File-Sharing System: Measurements and Analysis",
booktitle="Peer-to-Peer Systems IV",
year="2005",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="205--216",
abstract="Of the many P2P file-sharing prototypes in existence, BitTorrent is one of the few that has managed to attract millions of users. BitTorrent relies on other (global) components for file search, employs a moderator system to ensure the integrity of file data, and uses a bartering technique for downloading in order to prevent users from freeriding. In this paper we present a measurement study of BitTorrent in which we focus on four issues, viz. availability, integrity, flashcrowd handling, and download performance. The purpose of this paper is to aid in the understanding of a real P2P system that apparently has the right mechanisms to attract a large user community, to provide measurement data that may be useful in modeling P2P systems, and to identify design issues in such systems.",
isbn="978-3-540-31906-1"
}

 @misc{percival2009stronger,
  title={Stronger key derivation via sequential memory-hard functions},
  author={Percival, Colin},
  year={2009},
  url={http://www.tarsnap.com/scrypt/scrypt.pdf},
  publisher={BSDCan}
}


@misc{schneier2019Jul,
	title = {{Data Is a Toxic Asset - Schneier on Security}},
	author = {Schneier, Bruce},
	year = {2019},
	month = {Jul},
	note = {[Online; accessed 6. Aug. 2020]},
	url = {https://www.schneier.com/blog/archives/2016/03/data_is_a_toxic.html}
}

@misc{hughes1993,
	title = {{A Cypherpunk's Manifesto}},
	author = {Hughes, Eric},
	year = {1993},
	month = {Mar},
	note = {[Online; accessed 7. Aug. 2020]},
	url = {https://www.activism.net/cypherpunk/manifesto.html}
}