Author:
Chelladurai Usharani,Pandian Seethalakshmi
Publisher
Springer Science and Business Media LLC
Reference35 articles.
1. Adhikari N, Bushra N, Ramkumar M (2018) Complete Merkle hash trees for large dynamic spatial data. In: 2019 International conference on computational science and computational intelligence (CSCI). IEEE, pp 1318–1324
2. Atighehchi K, Rolland R (2016) Optimization of tree modes for parallel hash functions: a case study. IEEE Trans Comput 7(21):1–16
3. Bosamia M, Patel D (2018) Current trends and future implementation possibilities of the Merkel tree. Int J Comput Sci Eng 8(8):247–267
4. Dhumwad S, Sukhadeve M, Naik C, Manjunath KN, Prabhu S (2017) A peer to peer money transfer using SHA256 and Merkle Tree. In: 2017 23rd annual conference on advanced computing and communications. IEEE, pp 1–4
5. Guo J, Sun J (2020) Secure and efficient nearest neighbor query for an outsourced database. IEEE Access 8(1):1–11
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献