E. Androulaki and G. O. Karame, Hiding transaction amounts and balances in bitcoin, International Conference on Trust and Trustworthy Computing, pp.161-178, 2014.

E. Androulaki, G. O. Karame, M. Roeschlin, T. Scherer, and S. Capkun, Evaluating user privacy in bitcoin, International Conference on Financial Cryptography and Data Security, pp.34-51, 2013.

M. Backes, I. Goldberg, A. Kate, and E. Mohammadi, Provably secure and practical onion routing, 2012 IEEE 25th Computer Security Foundations Symposium, pp.369-385, 2012.

M. Backes and S. Meiser, Differentially private smart metering with battery recharging, Data Privacy Management and Autonomous Spontaneous Security, pp.194-212, 2014.

R. Bar-yehuda and S. Even, A local-ratio theorem for approximating the weighted vertex cover problem, Annals of Discrete Mathematics, vol.25, pp.27-46, 1985.

G. Bissias, A. P. Ozisik, B. N. Levine, and M. Liberatore, Sybil-resistant mixing for bitcoin, Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp.149-158, 2014.

J. Bonneau, A. Narayanan, A. Miller, J. Clark, J. A. Kroll et al., Mixcoin: Anonymity for bitcoin with accountable mixes, International Conference on Financial Cryptography and Data Security, pp.486-504, 2014.

S. Brânzei, E. Segal-halevi, and A. Zohar, How to charge lightning, 2017.

S. Castillo-pérez and J. Garcia-alfaro, Onion routing circuit construction via latency graphs, Computers & Security, vol.37, pp.197-214, 2013.

M. Conti, S. Kumar, C. Lal, and S. Ruj, A survey on security and privacy issues of bitcoin, IEEE Communications Surveys & Tutorials, 2018.

C. Decker and R. Wattenhofer, A fast and scalable payment network with bitcoin duplex micropayment channels, Symposium on SelfStabilizing Systems, pp.3-18, 2015.

J. A. Donet, C. Pérez-sola, and J. Herrera-joancomartí, The bitcoin P2P network, International Conference on Financial Cryptography and Data Security, pp.87-102, 2014.

C. Dwork, Differential privacy: A survey of results, International Conference on Theory and Applications of Models of Computation, pp.1-19, 2008.

, Elements Project. c-lightning -a lightning network implementation in C, 2019.

G. Fanti and P. Viswanath, Deanonymization in the bitcoin P2P network, Advances in Neural Information Processing Systems, pp.1364-1373, 2017.

E. Gelenbe and Y. M. Kadioglu, Energy life-time of wireless nodes with network attacks and mitigation, 2018 IEEE International Conference on Communications Workshops (ICC Workshops), pp.1-6, 2018.

J. Herrera-joancomartí, Research and challenges on bitcoin anonymity, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, pp.3-16, 2014.

H. A. Jawaheri, M. A. Sabah, Y. Boshmaf, and A. Erbad, When a small leak sinks a great ship: Deanonymizing tor hidden service users through bitcoin transactions analysis, 2018.

G. O. Karame, E. Androulaki, and S. Capkun, Double-spending fast payments in bitcoin, Proceedings of the 2012 ACM conference on Computer and communications security, pp.906-917, 2012.

P. Koshy, D. Koshy, and P. Mcdaniel, An analysis of anonymity in bitcoin using P2P network traffic, International Conference on Financial Cryptography and Data Security, pp.469-485, 2014.

I. D. Mastan and S. Paul, A new approach to deanonymization of unreachable bitcoin nodes, International Conference on Cryptology and Network Security, pp.277-298, 2017.

S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. Mccoy et al., A fistful of bitcoins: characterizing payments among men with no names, Proceedings of the 2013 conference on Internet measurement conference, pp.127-140, 2013.

I. Miers, C. Garman, M. Green, A. D. Rubin, and . Zerocoin, Anonymous distributed e-cash from bitcoin, Security and Privacy (SP), 2013 IEEE Symposium on, pp.397-411, 2013.
DOI : 10.1109/sp.2013.34

URL : http://spar.isi.jhu.edu/~mgreen/ZerocoinOakland.pdf

C. Milling, C. Caramanis, S. Mannor, and S. Shakkottai, On identifying the causative network of an epidemic, Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on, pp.909-914, 2012.

M. Moser, R. Bohme, and D. Breuker, An inquiry into money laundering tools in the bitcoin ecosystem, eCrime Researchers Summit (eCRS), pp.1-14, 2013.

J. Poon and T. Dryja, The bitcoin lightning network: Scalable off-chain instant payments, 2015.

C. Pu and S. Lim, A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: design, analysis, and evaluation, IEEE Systems Journal, vol.12, issue.1, pp.834-842, 2018.

A. Ranchal-pedrosa, M. Potop-butucaru, and S. Tucci-piergiovanni, Lightning factories. Cryptology ePrint Archive, 2018.

F. Reid and M. Harrigan, An analysis of anonymity in the bitcoin system, Security and privacy in social networks, pp.197-223, 2013.

D. Ron and A. Shamir, How did dread pirate roberts acquire and protect his bitcoin wealth, International Conference on Financial Cryptography and Data Security, pp.3-15, 2014.
DOI : 10.1007/978-3-662-44774-1_1

URL : https://eprint.iacr.org/2013/782.pdf

A. Samokhvalov, J. Poon, and O. Osuntokun, Lightning Network In-Progress Specifications. BOLT 11: Invoice Protocol for Lightning Payments, 2018.

A. Samokhvalov, J. Poon, and O. Osuntokun, The lightning network daemon, 2018.

E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers et al., Zerocash: Decentralized anonymous payments from bitcoin, 2014 IEEE Symposium on Security and Privacy (SP), pp.459-474, 2014.
DOI : 10.1109/sp.2014.36

URL : http://cs.tau.ac.il/~tromer/papers/zerocash-oakland2014.pdf

M. Spagnuolo, F. Maggi, and S. Zanero, Bitiodine: Extracting intelligence from the bitcoin network, International Conference on Financial Cryptography and Data Security, pp.457-468, 2014.

D. Sy, R. Chen, and L. Bao, Odar: On-demand anonymous routing in ad hoc networks, Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference on, pp.267-276, 2006.

E. Y. Vasserman and N. Hopper, Vampire attacks: draining life from wireless ad hoc sensor networks, IEEE transactions on mobile computing, vol.12, issue.2, pp.318-332, 2013.
DOI : 10.1109/tmc.2011.274

URL : http://people.cs.vt.edu/~irchen/6204/pdf/Vasserman-TMC13.pdf