S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.

Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, 2017 IEEE International Congress on, pp.557-564

C. Dwork and M. Naor, Annual International Cryptology Conference, pp.139-147, 1992.

M. Jakobsson and A. Juels, Secure Information Networks, pp.258-272, 1999.

S. King and S. , , 2012.

I. Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld, ACM SIGMETRICS Performance Evaluation Review, 2014.

N. Company, Nem, technical reference, version 1.2.1. Tech. rep, NEM company, 2018.

V. Buterin, , 2014.

E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers et al., 2014 IEEE Symposium on Security and Privacy (SP, pp.459-474, 2014.

I. Miers, C. Garman, M. Green, and A. D. Rubin, Security and Privacy (SP), pp.397-411, 2013.

C. Cachin, Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol.310, p.310, 2016.

J. Lartigau, F. Bucamp, and D. C. De-casaubon, Pikciochain: a new eco-system for personal data, 2018.

P. Company, Pikciochain, the personal data chain, 2018.

G. D. Regulation, Official Journal of the European Union, vol.119, 2016.

M. Gill and G. Taylor, British Journal of Criminology, vol.44, issue.4, p.582, 2004.

W. H. Muller, C. H. Kalin, and J. G. Goldsworth, Anti-Money Laundering: international law and practice, 2007.

R. C. Merkle, Conference on the theory and application of cryptographic techniques, pp.369-378, 1987.

Q. Wang, T. Dunlap, Y. Cho, and G. Qu, , pp.1-6, 2017.