Agarwal, A. and Saraswat, R. (2013). A survey of group signature technique, its applications and attacks, International Journal of Engineering and Innovative Technology2(10): 28–35.
Al Jawaheri, H., Al Sabah, M., Boshmaf, Y. and Erbad, A. (2020). Deanonymizing tor hidden service users through bitcoin transactions analysis, Computers & Security89: 101684.10.1016/j.cose.2019.101684
Androulaki, E., Karame, G. O., Roeschlin, M., Scherer, T. and Capkun, S. (2013). Evaluating user privacy in bitcoin, International Conference on Financial Cryptography and Data Security, Okinawa, Japan, pp. 34–51.
Ateniese, G., Song, D. and Tsudik, G. (2002). Quasi-efficient revocation of group signatures, International Conference on Financial Cryptography, Southampton, Bermuda, pp. 183–197.
Bellare, M., Micciancio, D. and Warinschi, B. (2003). Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, pp. 614–629.
Blass, E.-O. and Kerschbaum, F. (2018). Strain: A secure auction for blockchains, European Symposium on Research in Computer Security, Barcelona, Spain, pp. 87–110.
Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A. and Felten, E.W. (2015). SOK: Research perspectives and challenges for bitcoin and cryptocurrencies, 2015 IEEE Symposium on Security and Privacy, San Jose, USA, pp. 104–121.
Chaum, D. and Van Heyst, E. (1991). Group signatures, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, pp. 257–265.
Chen, L. and Pedersen, T.P. (1994). New group signature schemes, Workshop on the Theory and Application of of Cryptographic Techniques, Perugia, Italy, pp. 171–181.
Chen, Y.-H., Chen, S.-H. and Lin, I.-C. (2018). Blockchain based smart contract for bidding system, 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, Japan, pp. 208–211.
Conti, M., Kumar, E.S., Lal, C. and Ruj, S. (2018). A survey on security and privacy issues of bitcoin, IEEE Communications Surveys & Tutorials20(4): 3416–3452.10.1109/COMST.2018.2842460
Feng, Q., He, D., Zeadally, S., Khan, M.K. and Kumar, N. (2019). A survey on privacy protection in blockchain system, Journal of Network and Computer Applications126(8): 45–58.10.1016/j.jnca.2018.10.020
Fernandez-Vazquez, S., Rosillo, R., De La Fuente, D. and Priore, P. (2019). Blockchain in fintech: A mapping study, Sustainability11(22): 6366.10.3390/su11226366
Galal, H.S. and Youssef, A.M. (2018). Verifiable sealed-bid auction on the Ethereum blockchain, International Conference on Financial Cryptography and Data Security, Nieuwpoort, Curac¸ao, pp. 265–278.
Gao, W., Hatcher, W.G. and Yu, W. (2018). A survey of blockchain: Techniques, applications, and challenges, 2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, pp. 1–11.
Jouini, M., Rabai, L.B.A. and Aissa, A.B. (2014). Classification of security threats in information systems, Procedia Computer Science32: 489–496.10.1016/j.procs.2014.05.452
Karame, G. (2016). On the security and scalability of bitcoin’s blockchain, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, pp. 1861–1862.
Kim, H.-J., Lim, J.I. and Lee, D.H. (2000). Efficient and secure member deletion in group signature schemes, International Conference on Information Security and Cryptology, Seoul, Korea, pp. 150–161.
Kobusińska, A., Brzeziński, J., Boroń, M., Inatlewski, Ł., Jabczyński, M. and Maciejewski, M. (2016). A branch hash function as a method of message synchronization in anonymous P2P conversations, International Journal of Applied Mathematics and Computer Science26(2): 479–493, DOI: 10.1515/amcs-2016-0034.10.1515/amcs-2016-0034
Kong, W., Jiang, B., Fan, Q., Zhu, L. and Wei, X. (2018). Personal identification based on brain networks of EEG signals, International Journal of Applied Mathematics and Computer Science28(4): 745–757, DOI: 10.2478/amcs-2018-0057.10.2478/amcs-2018-0057
Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts, 2016 IEEE Symposium on Security and Privacy (SP), San Jose, USA, pp. 839–858.
Lafourcade, P., Nopere, M., Picot, J., Pizzuti, D. and Roudeix, E. (2019). Security analysis of auctionity: A blockchain based e-auction, International Symposium on Foundations & Practice of Security FPS 19, Toulouse, France, pp. 290–307.
Lee, C.-C., Ho, P.-F. and Hwang, M.-S. (2009). A secure e-auction scheme based on group signatures, Information Systems Frontiers11(3): 335–343.10.1007/s10796-008-9094-3
Li, S., Zhang, Y., Wang, Y. and Sun, W. (2019). Utility optimization–based bandwidth allocation for elastic and inelastic services in peer-to-peer networks, International Journal of Applied Mathematics and Computer Science29(1): 111–123, DOI: 10.2478/amcs-2019-0009.10.2478/amcs-2019-0009
Ron, D. and Shamir, A. (2013). Quantitative analysis of the full bitcoin transaction graph, International Conference on Financial Cryptography and Data Security, Okinawa, Japan, pp. 6–24.
Sun, Y., Sun, Y., Luo, M., Gu, L., Zheng, S. and Yang, Y. (2013). Comment on Lee et al.’s group signature and e-auction scheme, Information Systems Frontiers15(1): 133–139.
Wang, X., Zha, X., Ni, W., Liu, R.P., Guo, Y.J., Niu, X. and Zheng, K. (2019). Survey on blockchain for internet of things, Computer Communications136: 10–29.10.1016/j.comcom.2019.01.006