1. Yli-Huumo, J., Ko, D., Choi, S., Park, S., Smolander, K.: Where is current research on blockchain technology? A systematic review. PLoS ONE 11(10), e0163477 (2016)
2. Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc., Sebastopol (2015)
3. Anitha Kumari, K., Sudha Sadasivam, G., Rohini, L.: An efficient 3D elliptic curve Diffie-Hellman (ECDH) based two-server password-only authenticated key exchange protocol with provable security. IETE J. Res. T & F 62(6), 762–773 (2016)
4. Anitha Kumari, K., Sudha Sadasivam, G.: A Comparative Analysis of Classical Cryptography vs. Quantum Safe Cryptography, Medical Big Data and Internet of Medical Things: Advances, Challenges and Applications. CRC Press, Boca Raton (2018)
5. Thomson, L.L.: Health care data breaches and information security addressing threats and risks to patient data. In: Data Breach and Encryption Handbook, pp. 57–85 (2012)