@misc{ac_ms2013,
  title = {Fraudulent digital certificates could allow spoofing},
  howpublished = {\url{https://technet.microsoft.com/en-us/library/ security/2798897.aspx}},
  note = {January, 2010}
}

@misc{slasher2014,
  title = {Slasher: A Punitive Proof-of-Stake Algorithm},
  howpublished = {\url{https://blog.ethereum.org/2014/01/15/slasher-a-punitive-proof-of-stake-algorithm/}},
  note = {January, 2014}
}

@inproceedings{6912770, 
author={O'Dwyer, K.J. and Malone, D.}, 
booktitle={Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014). 25th IET}, 
title={Bitcoin mining and its energy footprint}, 
year={2014}, 
pages={280-285}, 
keywords={data mining;electronic money;energy conservation;Ireland;bitcoin concept;bitcoin mining;digital cryptocurrency;electricity consumption;energy cost;energy footprint;monetary transactions;Bitcoin}, 
doi={10.1049/cp.2014.0699}, 
month={June},}

@misc{findex2015,
  title = {The Global Findex Database 2014 Measuring Financial Inclusion Around the World},
  howpublished = {\url{ http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2015/ 04/15/090224b082dca3aa/1_0/Rendered/PDF/The0Global0Fin0ion0around0the0world.pdf}},
  note = {Policy Research Working Paper 7255. World Bank}
}

@inproceedings{Dwork:1992:PVP:646757.705669,
 author = {Dwork, Cynthia and Naor, Moni},
 title = {Pricing via Processing or Combatting Junk Mail},
 booktitle = {Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology},
 series = {CRYPTO '92},
 year = {1993},
 isbn = {3-540-57340-2},
 pages = {139--147},
 numpages = {9},
 url = {http://dl.acm.org/citation.cfm?id=646757.705669},
 acmid = {705669},
 publisher = {Springer-Verlag},
 address = {London, UK, UK},
} 

@misc{CGAP2008,
  title = {Making Money Transfers Work for Microfinance Institutions},
  howpublished = {\url{http://www.cgap.org/sites/default/files/CGAP- Technical- Guide- Making- Money- Transfers- Work- for- Microfinance- Institutions- A- Technical- Guide- to- Developing- and- Delivering- Money- Transfers-Mar-2008.pdf}},
  note = {March, 2008}
}

@misc{Provost2013,
  title = {Why do Africans pay the most to send money home?},
  howpublished = {\url{http://www.theguardian.com/global- development/2013/jan/30/africans- pay- most- send- money}},
  note = {January, 2013}
}

@article{Bonneau:2015em,
author = {Bonneau, Joseph and Miller, Andrew and Clark, Jeremy and Narayanan, Arvind and Kroll, Joshua A and Felten, Edward W},
title = {{SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.}},
journal = {IEEE Symposium on Security and Privacy},
year = {2015},
pages = {104--121}
}

@article{Karame:2012jt,
author = {Karame, Ghassan and Androulaki, Elli and Capkun, Srdjan},
title = {{Double-spending fast payments in bitcoin.}},
journal = {ACM Conference on Computer and Communications Security},
year = {2012},
pages = {906--917}
}




@misc{BBL2015,
  title = {Boatfuls of cash: how do you get money into fragile states?},
  howpublished = {\url{http://www.theguardian.com/global- development- professionals- network/2015/feb/19/boatfuls- of- cash- how- do- you- get- money- into- fragile- states}},
  note = {February, 2015}
}

@misc{tendermint2014,
  title = {Tendermint: Consensus without Mining},
  howpublished = {\url{http://tendermint.com/docs/tendermint.pdf}},
  note = {2014}
}

@misc{bitcoin2008,
  author = {Satoshi Nakamoto},
  title = {Bitcoin: A peer-to-peer electronic cash system},
  howpublished = {\url{http://bitcoin.org/bitcoin.pdf}},
}

@inproceedings{Douceur:2002:SA:646334.687813,
 author = {Douceur, John R.},
 title = {The Sybil Attack},
 booktitle = {Revised Papers from the First International Workshop on Peer-to-Peer Systems},
 series = {IPTPS '01},
 year = {2002},
 isbn = {3-540-44179-4},
 pages = {251--260},
 numpages = {10},
 url = {http://dl.acm.org/citation.cfm?id=646334.687813},
 acmid = {687813},
 publisher = {Springer-Verlag},
 address = {London, UK, UK},
} 

@misc{ripple2014,
  title = {The Ripple protocol consensus algorithm},
  howpublished = {\url{https://ripple.com/files/ripple_consensus_whitepaper.pdf}},
  note = {2014}

}

@inproceedings{Alchieri:2008:BCU:1496310.1496316,
 author = {Alchieri, Eduardo A. and Bessani, Alysson Neves and Silva Fraga, Joni and Greve, Fab\'{\i}ola},
 title = {Byzantine Consensus with Unknown Participants},
 booktitle = {Proceedings of the 12th International Conference on Principles of Distributed Systems},
 series = {OPODIS '08},
 year = {2008},
 isbn = {978-3-540-92220-9},
 location = {Luxor, Egypt},
 pages = {22--40},
 numpages = {19},
 url = {http://dx.doi.org/10.1007/978-3-540-92221-6_4},
 doi = {10.1007/978-3-540-92221-6_4},
 acmid = {1496316},
 publisher = {Springer-Verlag},
 address = {Berlin, Heidelberg},
 keywords = {Byzantine fault tolerance, Consensus, Self-organizing systems},
} 


@article{Pease:1980:RAP:322186.322188,
 author = {Pease, M. and Shostak, R. and Lamport, L.},
 title = {Reaching Agreement in the Presence of Faults},
 journal = {J. ACM},
 issue_date = {April 1980},
 volume = {27},
 number = {2},
 month = apr,
 year = {1980},
 issn = {0004-5411},
 pages = {228--234},
 numpages = {7},
 url = {http://doi.acm.org/10.1145/322186.322188},
 doi = {10.1145/322186.322188},
 acmid = {322188},
 publisher = {ACM},
 address = {New York, NY, USA},
} 

@article{Lamport:1982:BGP:357172.357176,
 author = {Lamport, Leslie and Shostak, Robert and Pease, Marshall},
 title = {The Byzantine Generals Problem},
 journal = {ACM Trans. Program. Lang. Syst.},
 issue_date = {July 1982},
 volume = {4},
 number = {3},
 month = jul,
 year = {1982},
 issn = {0164-0925},
 pages = {382--401},
 numpages = {20},
 url = {http://doi.acm.org/10.1145/357172.357176},
 doi = {10.1145/357172.357176},
 acmid = {357176},
 publisher = {ACM},
 address = {New York, NY, USA},
} 


@misc{neucoin2015,
  title = {NeuCoin: the first secure, cost-efficient and decentralized cryptocurrency},
  howpublished = {\url{http://www.neucoin.org/en/whitepaper/download}},
  note = {March, 2015}
}

@misc{dc_google2015,
  title = {Maintaining digital certificate security},
  howpublished = {\url{http://googleonlinesecurity.blogspot.sg/2015/03/maintaining-digital-certificate-security.html}},
  note = {March, 2015}
}

@article{Kim:2013up,
author = {Kim, Tiffany Hyun-Jin and Huang, Lin-Shung and Perrig, Adrian and Jackson, Collin and Gligor, Virgil D},
title = {{Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure.}},
journal = {WWW},
year = {2013},
pages = {679--690}
}

@misc{ct_google2013,
  title = {Certificate Transparency},
  howpublished = {\url{http://tools.ietf.org/html/rfc6962}},
  note = {June, 2013}
}

@book{Basin:2014bn,
author = {Basin, David and Cremers, Cas and Kim, Tiffany Hyun-Jin and Perrig, Adrian and Sasse, Ralf and Szalachowski, Pawel},
title = {{ARPKI: Attack Resilient Public-Key Infrastructure}},
publisher = {ACM},
year = {2014},
series = {Attack Resilient Public-Key Infrastructure},
address = {New York, New York, USA},
month = nov
}

@misc{cryptoeprint:2014:1004,
    author = {Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman},
    title = {CONIKS: Bringing Key Transparency to End Users},
    howpublished = {Cryptology ePrint Archive, Report 2014/1004},
    year = {2014},
    note = {\url{http://eprint.iacr.org/}},
}

@misc{attack_bbt2013,
 title = {Terracoin attack over 1.2TH confirmed},
 howpublished = {\url{https://bitcointalk.org/index.php?topic=261986.0}},
 note = {July, 2013}
}

@misc{attack_cb2013,
  title = {Feathercoin hit by massive attack},
  howpublished = {\url{http://www.coindesk.com/feathercoin-hit-by-massive-attack/}},
  note = {June, 2013}
}

@inproceedings{Castro:1999:PBFT,
 author = {Castro, Miguel and Liskov, Barbara},
 title = {Practical Byzantine Fault Tolerance},
 year = {1999},
 isbn = {1-880446-39-1},
 pages = {173--186},
 numpages = {14},
 url = {http://dl.acm.org/citation.cfm?id=296806.296824},
 publisher = {USENIX Association},
} 

@misc{peer_isp2010,
  title = {},
  howpublished = {\url{http://drpeering.net/white-papers/Art-Of-Peering-The-Peering-Playbook.html}},
  author = {William B. Norton},
  note = {August, 2010}
}

@inproceedings{Ben-Or:1983:AFC:800221.806707,
 author = {Ben-Or, Michael},
 title = {Another Advantage of Free Choice (Extended Abstract): Completely Asynchronous Agreement Protocols},
 booktitle = {Proceedings of the Second Annual ACM Symposium on Principles of Distributed Computing},
 series = {PODC '83},
 year = {1983},
 isbn = {0-89791-110-5},
 location = {Montreal, Quebec, Canada},
 pages = {27--30},
 numpages = {4},
 url = {http://doi.acm.org/10.1145/800221.806707},
 doi = {10.1145/800221.806707},
 acmid = {806707},
 publisher = {ACM},
 address = {New York, NY, USA},
} 

@article{Bracha:1985:ACB:4221.214134,
 author = {Bracha, Gabriel and Toueg, Sam},
 title = {Asynchronous Consensus and Broadcast Protocols},
 journal = {J. ACM},
 issue_date = {Oct. 1985},
 volume = {32},
 number = {4},
 month = oct,
 year = {1985},
 issn = {0004-5411},
 pages = {824--840},
 numpages = {17},
 url = {http://doi.acm.org/10.1145/4221.214134},
 doi = {10.1145/4221.214134},
 acmid = {214134},
 publisher = {ACM},
 address = {New York, NY, USA},
} 

@inproceedings{Li:2007:BOF:1973430.1973440,
 author = {Li, Jinyuan and Mazi{\'e}res, David},
 title = {Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems},
 booktitle = {Proceedings of the 4th USENIX Conference on Networked Systems Design \&\#38; Implementation},
 series = {NSDI'07},
 year = {2007},
 location = {Cambridge, MA},
 pages = {10--10},
 numpages = {1},
 url = {http://dl.acm.org/citation.cfm?id=1973430.1973440},
 acmid = {1973440},
 publisher = {USENIX Association},
 address = {Berkeley, CA, USA},
} 

@inproceedings{Oki:1988:VRN:62546.62549,
 author = {Oki, Brian M. and Liskov, Barbara H.},
 title = {Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems},
 booktitle = {Proceedings of the Seventh Annual ACM Symposium on Principles of Distributed Computing},
 series = {PODC '88},
 year = {1988},
 isbn = {0-89791-277-2},
 location = {Toronto, Ontario, Canada},
 pages = {8--17},
 numpages = {10},
 url = {http://doi.acm.org/10.1145/62546.62549},
 doi = {10.1145/62546.62549},
 acmid = {62549},
 publisher = {ACM},
 address = {New York, NY, USA},
} 

@article{Lamport:1998:PP:279227.279229,
 author = {Lamport, Leslie},
 title = {The Part-time Parliament},
 journal = {ACM Trans. Comput. Syst.},
 issue_date = {May 1998},
 volume = {16},
 number = {2},
 month = may,
 year = {1998},
 issn = {0734-2071},
 pages = {133--169},
 numpages = {37},
 url = {http://doi.acm.org/10.1145/279227.279229},
 doi = {10.1145/279227.279229},
 acmid = {279229},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {state machines, three-phase commit, voting},
} 

@inproceedings{Ongaro:2014:SUC:2643634.2643666,
 author = {Ongaro, Diego and Ousterhout, John},
 title = {In Search of an Understandable Consensus Algorithm},
 booktitle = {Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference},
 series = {USENIX ATC'14},
 year = {2014},
 isbn = {978-1-931971-10-2},
 location = {Philadelphia, PA},
 pages = {305--320},
 numpages = {16},
 url = {http://dl.acm.org/citation.cfm?id=2643634.2643666},
 acmid = {2643666},
 publisher = {USENIX Association},
 address = {Berkeley, CA, USA},
} 

@article{6894199, 
author={Van Renesse, R. and Schiper, N. and Schneider, F.B.}, 
journal={Dependable and Secure Computing, IEEE Transactions on}, 
title={Vive La Diff{\'e}rence: Paxos vs. Viewstamped Replication vs. Zab}, 
year={2015}, 
volume={12}, 
number={4}, 
pages={472-484}, 
keywords={distributed processing;failure analysis;reliability;Paxos replication protocols;Viewstamped replication protocols;Zab replication protocols;asynchronous environments;crash failures;refinement mappings;Abstracts;Computer crashes;Concrete;Delays;Proposals;Protocols;Reactive power;Systems specification methodology;distributed systems;reliability}, 
doi={10.1109/TDSC.2014.2355848}, 
ISSN={1545-5971}, 
month={July},}

@inproceedings{Lamport:2011:BPR:2075029.2075058,
 author = {Lamport, Leslie},
 title = {Byzantizing Paxos by Refinement},
 booktitle = {Proceedings of the 25th International Conference on Distributed Computing},
 series = {DISC'11},
 year = {2011},
 isbn = {978-3-642-24099-7},
 location = {Rome, Italy},
 pages = {211--224},
 numpages = {14},
 url = {http://dl.acm.org/citation.cfm?id=2075029.2075058},
 acmid = {2075058},
 publisher = {Springer-Verlag},
 address = {Berlin, Heidelberg},
} 

@inproceedings{Lamport:2011:BAL:2075029.2075043,
 author = {Lamport, Leslie},
 title = {Brief Announcement: Leaderless Byzantine Paxos},
 booktitle = {Proceedings of the 25th International Conference on Distributed Computing},
 series = {DISC'11},
 year = {2011},
 isbn = {978-3-642-24099-7},
 location = {Rome, Italy},
 pages = {141--142},
 numpages = {2},
 url = {http://dl.acm.org/citation.cfm?id=2075029.2075043},
 acmid = {2075043},
 publisher = {Springer-Verlag},
 address = {Berlin, Heidelberg},
} 

@inproceedings{Aspnes:2010:MAS:1835698.1835802,
 author = {Aspnes, James},
 title = {A Modular Approach to Shared-memory Consensus, with Applications to the Probabilistic-write Model},
 booktitle = {Proceedings of the 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing},
 series = {PODC '10},
 year = {2010},
 isbn = {978-1-60558-888-9},
 location = {Zurich, Switzerland},
 pages = {460--467},
 numpages = {8},
 url = {http://doi.acm.org/10.1145/1835698.1835802},
 doi = {10.1145/1835698.1835802},
 acmid = {1835802},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {consensus, distributed computing, randomization, shared memory},
} 

@misc{shs2015,
title = {Secure Hash Standard (SHS)},
howpublished = {\url{http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf}},
note = {March, 2012}
}

@article{Clark:2005:TCD:1074047.1074049,
 author = {Clark, David D. and Wroclawski, John and Sollins, Karen R. and Braden, Robert},
 title = {Tussle in Cyberspace: Defining Tomorrow's Internet},
 journal = {IEEE/ACM Trans. Netw.},
 issue_date = {June 2005},
 volume = {13},
 number = {3},
 month = jun,
 year = {2005},
 issn = {1063-6692},
 pages = {462--475},
 numpages = {14},
 url = {http://dx.doi.org/10.1109/TNET.2005.850224},
 doi = {10.1109/TNET.2005.850224},
 acmid = {1074049},
 publisher = {IEEE Press},
 address = {Piscataway, NJ, USA},
 keywords = {competition, design principles, economics, network architecture, trust, tussle},
}

@article{Fischer:1985:IDC:3149.214121,
 author = {Fischer, Michael J. and Lynch, Nancy A. and Paterson, Michael S.},
 title = {Impossibility of Distributed Consensus with One Faulty Process},
 journal = {J. ACM},
 issue_date = {April 1985},
 volume = {32},
 number = {2},
 month = apr,
 year = {1985},
 issn = {0004-5411},
 pages = {374--382},
 numpages = {9},
 url = {http://doi.acm.org/10.1145/3149.214121},
 doi = {10.1145/3149.214121},
 acmid = {214121},
 publisher = {ACM},
 address = {New York, NY, USA},
} 

@article{Dwork:1988:CPP:42282.42283,
 author = {Dwork, Cynthia and Lynch, Nancy and Stockmeyer, Larry},
 title = {Consensus in the Presence of Partial Synchrony},
 journal = {J. ACM},
 issue_date = {April 1988},
 volume = {35},
 number = {2},
 month = apr,
 year = {1988},
 issn = {0004-5411},
 pages = {288--323},
 numpages = {36},
 url = {http://doi.acm.org/10.1145/42282.42283},
 doi = {10.1145/42282.42283},
 acmid = {42283},
 publisher = {ACM},
 address = {New York, NY, USA},
} 
