Gilbert, S. and N. Lynch, Perspectives on the CAP Theorem. Computer, 2011. 45(2): p. 30-36.
Pritchett, D., BASE: An Acid Alternative. 2008. 6(3): p. 48-55.
Stoica, I., et al., Chord: a scalable peer-to-peer lookup protocol for Internet applications. IEEE ACM Transactions on Networking, 2003. 11(1): p. 17-32.
Nakamoto, S., [Bitcoin: A peer-to-peer electronic cash system](./resources/Bitcoin_A Peer-to-Peer Electronic Cash System.pdf). Consulted, 2008.
Wood, G., ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER FINAL DRAFT - UNDER REVIEW. 2014.
Lamport, L., R. Shostak, and M. Pease, The Byzantine Generals Problem. ACM Trans. Program. Lang. Syst., 1982. 4(3): p. 382-401. Lecture
Castro, M. and B. Liskov. Practical Byzantine fault tolerance. Usenix Association Proceedings of the Third Symposium on Operating Systems Design and Implementation. 1999. 173-186.
Lamport, L.,The part-time parliament. 1998: ACM. 133-169.
Lamport, L., Paxos Made Simple. ACM SIGACT News (Distributed Computing Column) 32, 4 (Whole Number 121, December 2001), 2001: p. 51-58.
LSM-Tree
SSTable
Cattell, R., Scalable SQL and NoSQL data stores. Acm Sigmod Record, 2011. 39(4): p. 12-27.
Charikar, M., J. Steinhardt, and G. Valiant. Learning from untrusted data. in ACM Sigact Symposium on Theory of Computing. 2017.
Agrawal, R., et al. Order preserving encryption for numeric data. in ACM SIGMOD International Conference on Management of Data. 2004.
Benet, J., IPFS - Content Addressed, Versioned, P2P File System. Eprint Arxiv, 2014.