Author:
Anirudh S.,Shaan Sundar R.,Ganapathy Sannasi
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference19 articles.
1. Hofheinz, D., Malone-Lee, J., & Stam, M. (2010). Obfuscation for cryptographic purposes. Journal of Cryptology, 23(1), 121–168.
2. Oliva, G. A., Hassan, A. E., & Jiang, Z. M. (2020). An exploratory study of smart contracts in the ethereum blockchain platform. Empirical Software Engineering, 25, 1864–1904.
3. Boyar, J., Matthews, P., & Peralta, R. (2013). Logic minimization techniques with applications to cryptology. Journal of Cryptology, 26, 280–312.
4. Bellare, M., Hoang, V. T., & Keelveedhi, S. (2014). Cryptography from compression functions: The UCE Bridge to the ROM. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 8616, 25–29.
5. Wang, J., Wang, S., Guo, J., Du, Y., Cheng, S., & Li, X. (2019). A Summary of research on blockchain in the field of intellectual property. Procedia Computer Science, 147, 191–197.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Blockchain data asset management technology based on a two-way transaction algorithm;International Journal of System Assurance Engineering and Management;2024-08-20
2. Predictive Power of Logistic Regression in Cryptocurrency Price Analysis;2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS);2024-04-18
3. Enhancing IoT Data Security with Blockchain Based Inner Product Encryption Algorithm;2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS);2024-04-18
4. An Approach for Securing IoT Data using Blockchain and Proxy Re-Encryption;2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS);2024-04-18
5. Enhanced Cloud Data Security with Lightweight Chaotic Map and Quantum Key Distribution;2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS);2024-04-18