Three Sources of Blockchain Technology Vulnerabilities - how to Deal with them? | IEEE Conference Publication | IEEE Xplore