EL LIBRO DE SATOSHI 5. S. Haber, W.S. Stornetta, “Secure names for bit-strings,” In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 28-35, April 1997. 6. A. Back, “Hashcash a denial of service counter-measure,” http://www.hashcash.org/papers/hashcash.pdf, 2002. 7. R.C. Merkle, “Protocols for public key cryptosystems,” In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980. 8. W. Feller, “An introduction to probability theory and its applications,” 1957. 336