Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, D., … Weitzner, D. J. (2015). “Keys under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications”. Communications of the ACM, 58(10), pp. 24-26.
Bambauer, D. (2013). “Middleman”. Florida Law Review Forum, 65, pp. 1-4.
Hobbes, T. (2010). Leviathan or The Matter. Forme and Power of a Common Wealth Ecclesiasticall and Civill (Ian Shapiro, Ed.). New Haven, CT: Yale University Press.
Kesan, J. P., and Shah, R. G. (2005). “Shaping Code”. Harvard Journal of Law and Technology, 18, pp. 319–399.
Madadi, M., and Shafiei, G. (2022). “New Capital Market In The Light Of Sixth Development Plan Law (Functionality Of Blockchain Technology In The Capital Market)”. Journal of Securities Exchange, 14(56), pp. 197-224. {in persian}
Miers, I., Garman, C., Green, M., and Rubin, A. D. (2013). “Zerocoin: Anonymous Distributed E-cash from Bitcoin”. IEEE Symposium on Security and Privacy (SP), pp. 397-411.
Shapiro, A. L. (1998). “Digital Middlemen and the Architecture of Electronic Commerce”. Ohio Northern University Law Review, 24, pp. 795–812.
Solum, L. B., and Chung, M. (2004). “The Layers Principle: Internet Architecture and the Law”. Notre Dame Law Review, 79, pp. 815-948.
Zittrain, J. (2003). “Internet Points of Control”. Boston College Law Review, 44, pp. 653–688.