Author:
Benaich Rihab,El Mendili Saida,Gahi Youssef
Publisher
Springer Nature Switzerland
Reference31 articles.
1. Almulihi, A., Alassery, F., Khan, A., Shukla, S., Gupta, B., Kumar, R.: Analyzing the implications of healthcare data breaches through computational technique. In: IASC, vol. 32, pp. 1763–1779 (2021). https://doi.org/10.32604/iasc.2022.023460
2. Studies in Computational Intelligence;Y Gahi,2021
3. Gahi, Y., Guennoun, M., Guennoun, Z., El-Khatib, K.: Encrypted processes for oblivious data retrieval. In: 2011 International Conference for Internet Technology and Secured Transactions, pp. 514–518 (2011)
4. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2009)
5. Tanwar, S.: Blockchain revolution from 1.0 to 5.0: technological perspective. In: Tanwar, S. (ed.) Blockchain Technology: From Theory to Practice, pp. 43–61. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-1488-1_2
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献