M. Babaioff, S. Dobzinski, S. Oren, and A. Zohar, On bitcoin and red balloons, Proceedings of the 13th ACM conference on electronic commerce, pp.56-73, 2012.
DOI : 10.1145/2229012.2229022

URL : http://www.cs.huji.ac.il/~avivz/pubs/12/Bitcoin_EC0212.pdf

M. Carlsten, H. Kalodner, S. M. Weinberg, and A. Narayanan, On the Instability of Bitcoin Without the Block Reward, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.154-167, 2016.
DOI : 10.1007/978-3-662-44774-1_5

Y. Coudene, Ergodic Theory and Dynamical Systems, pp.978-979, 2016.
DOI : 10.1007/978-1-4471-7287-1

I. Eyal, The Miner's Dilemma, 2015 IEEE Symposium on Security and Privacy, pp.89-103, 2015.
DOI : 10.1109/SP.2015.13

I. Eyal, A. E. Gencer, E. G. Sirer, and R. Van-renesse, Bitcoin-ng: A scalable blockchain protocol, pp.45-59, 2016.

I. Eyal and E. G. Sirer, Majority Is Not Enough: Bitcoin Mining Is Vulnerable, International Conference on Financial Cryptography and Data Security, pp.436-454, 2014.
DOI : 10.1007/978-3-662-45472-5_28

URL : http://www.cs.cornell.edu/~ie53/publications/btcProcArXiv.pdf

J. Garay, A. Kiayias, and N. Leonardos, The Bitcoin Backbone Protocol: Analysis and Applications, pp.281-310978, 2015.
DOI : 10.1007/978-3-662-46803-6_10

J. Göbel, H. P. Keeler, A. E. Krzesinski, and P. G. Taylor, Bitcoin blockchain??dynamics: The selfish-mine strategy in the presence of propagation delay, Performance Evaluation, vol.104, pp.23-41, 2016.
DOI : 10.1016/j.peva.2016.07.001

Y. Lewenberg, Y. Sompolinsky, and A. Zohar, Inclusive Block Chain Protocols, International Conference on Financial Cryptography and Data Security, pp.528-547, 2015.
DOI : 10.1007/978-3-662-47854-7_33

URL : http://www.cs.huji.ac.il/%7Eavivz/pubs/15/inclusive_btc.pdf

J. Liu, W. Li, G. O. Karame, and N. Asokan, Towards fairness of cryptocurrency payments. arXiv preprint arXiv:1609, p.7256, 2016.

R. C. Merkle, A Digital Signature Based on a Conventional Encryption Function, pp.369-378, 1988.
DOI : 10.1007/3-540-48184-2_32

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2018.

R. Pass, L. Seeman, and A. Shelat, Analysis of the Blockchain Protocol in Asynchronous Networks, IACR Cryptology ePrint Archive, vol.27, issue.2, p.454, 2016.
DOI : 10.1145/383059.383071

R. Pass and E. Shi, FruitChains, Proceedings of the ACM Symposium on Principles of Distributed Computing , PODC '17, 2016.
DOI : 10.1007/978-3-319-56614-6_22

M. D. Resnik, Choices, The Journal of Urology, vol.176, issue.6, 1987.
DOI : 10.1016/j.juro.2006.08.124

S. J. Russell and P. Norvig, Artificial Intelligence -A Modern Approach (3. internat, 2010.

A. Sapirshtein, Y. Sompolinsky, and A. Zohar, Optimal Selfish Mining Strategies in Bitcoin, International Conference on Financial Cryptography and Data Security, pp.515-532, 2016.
DOI : 10.1007/978-3-662-47854-7_32

URL : http://arxiv.org/pdf/1507.06183

M. Weiss, Conceptual Foundations of Risk Theory Technical bulletin (United States, Department of Agriculture), U.S. Department of Agriculture, 1987.