[1] N. Radziwill, “Blockchain revolution: How the technology behind Bitcoin is changing money, business, and the world,” The Quality Management Journal, vol. 25(1): pp. 64-65, 2018.##
[2] J.-S. Chou, et al., “A Novel ID-based Electronic Cash System from Pairings,” IACR Cryptology ePrint Archive, p. 339, 2009.##
[3] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system, 2008.##
[4] Y. Guo and C. Liang, “Blockchain application and outlook in the banking industry,” Financial Innovation, vol. 2(1), p. 24, 2016.##
[5] Z. Qin, et al., “A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing,” Computer Standards & Interfaces, vol. 54, pp. 55-60, 2017.##
[6] X. Chen, et al., “New and efficient conditional e-payment systems with transferability,” Future Generation Computer Systems, vol. 37, pp. 252-258, 2014.##
[7] E. Heilman, F. Baldimtsi, and S. Goldberg, “Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions,” in International conference on financial cryptography and data security, Springer, 2016.##
[8] L. Zhong, et al., “A secure versatile light payment system based on blockchain,” Future Generation Computer Systems, vol. 93, pp. 327-337, 2019.##
[9] F. Gao, et al., “A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks,” IEEE Network, vol. 32(6), pp. 184-192, 2018.##
[10] E. F. Jesus, et al., “A survey of how to use blockchain to secure internet of things and the stalker attack,” Security and Communication Networks, 2018.##
[11] P.-Y. Chang, M.-S. Hwang, and C.-C. Yang, “A blockchain-based traceable certification system,” in International Conference on Security with Intelligent Computing and Big-data Services, Springer, 2017.##
[12] L. Lamport, R. Shostak, and M. Pease, “The Byzantine Generals Problem ACM Transactions on Progamming Languages and Syetems,” vol. 4, no. 3, pp. 382-401, July 1982.##
[13] Yin, W., et al., “An anti-quantum transaction authentication approach in blockchain,” IEEE Access, vol. 6, pp. 5393-5401, 2018.##
[14] W. Stallings, “Network and internetwork security principles and practice,” Prentice Hall Englewood Cliffs, NJ., vol. 1, 1995.##
[15] M. Abe and M. Ohkub, “Provably Secure air Blind Signatures with Tight Revocation. inInternational Conference on the Theory and Application of Cryptology and Information Security, Springer, 2001.##
[16] L. Zhang, et al., “Blockchain based secure data sharing system for Internet of vehicles: A position paper,” Vehicular Communications, vol. 16, pp. 85-93, 2019.##
[17] S. K. Langford, “Threshold DSS signatures without a trusted party,” in Annual International Cryptology Conference, Springer, 1995.##
[18] D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” International journal of information security, vol. 1(1), pp. 36-63, 2001.##
[19] M. H. Kazemi, et al, “A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve,” Advanced Defence Sci.& Tech., vol. (1)8, pp. 147-167, 2020. (In Persian)##